A recent high-severity Denial of Service (DoS) vulnerability has been discovered in a WordPress backup plugin, prominently affecting over 200,000 sites. Named the Backuply plugin, it allows WordPress users to create reliable backups on multiple third-party cloud services.

A crucial security flaw has been detected in Backuply up to version 1.2.5, identified as CVE-2024-0842 by the National Vulnerability Database. This vulnerability allows unauthenticated attackers to make excessive server requests, ultimately leading to the server running out of resources.
This vulnerability was first reported by the vigilant eye of Villu Orav from WordFence, drawing attention to a concerning issue that could potentially affect thousands of WordPress websites globally.
Backuply, ever responsive and swiftly addressing this issue, has rectified this vulnerability in the subsequent version 1.2.6. As evidenced by the official Backuply changelog, the patch incorporated into the new version mitigates the risk posed by unauthenticated attacks.
Act Now: Update Your Backuply Plugin to Version 1.2.6
Given the potential havoc this vulnerability can wreak on your website’s functionality, it is strongly recommended that all users of the Backuply plugin update to version 1.2.6 at their earliest convenience. By doing so, users can effectively minimize their websites’ security risks and ensure smooth and uninterrupted operation.
Do not let the vulnerability of your WordPress website compromise your business. Update the Backuply plugin to version 1.2.6 today and continue to provide your customers with a dependable and secure online experience.
