Critical Vulnerability Patched in Backup and Staging by WP Time Capsule Plugin

Critical Vulnerability Patched in WP Time Capsule’s Backup and Staging Plugin: What You Need to Know

Photo of author

By Elman Tabakovic

Introduction

The WP Time Capsule plugin, with over 20,000 active installations, recently had a critical vulnerability that allowed unauthenticated users to gain administrative access. This issue, found in versions 1.22.20 and earlier, was due to broken authentication and privilege escalation flaws.

Thankfully, the developers quickly patched the vulnerability in version 1.22.21, ensuring better security for users.

The Vulnerability Explained

  • Nature of the Vulnerability: Unauthenticated users could log in as administrators.
  • Cause: Logical errors in the code allowed bypassing of security checks.
  • Affected Versions: 1.22.20 and earlier.

Detailed Breakdown

  1. Initial Request Handling: __construct function parses incoming requests.
  2. Request Validation: Functions like decode_server_request_wptc and is_valid_wptc_request decode and validate incoming data.
  3. Bypassing Security Checks: The vulnerability exploited flaws in the wptc_decode_auth_token function.
  4. Privilege Escalation: Successfully bypassing checks allowed attackers to log in as administrators.

The Patch

  • Partial Fix (v1.22.20): Applied within 6 hours, changing comparison checks to stricter methods.
  • Complete Fix (v1.22.21): Added additional hash comparisons to fully secure the plugin.

Conclusion

For robust security, always use strict comparison methods in authentication checks and regularly update plugins. If you’re using WP Time Capsule, ensure you’re on version 1.22.21 or later.