XCloner Backup and Restore WordPress Plugin Contains Critical Flaws

XCloner Backup and Restore is a WordPress plugin with more than 30,000 installations. The plugin is designed to provide WordPress users with easily customizable backups and simple-to-use restore functionality.

Unfortunately, Wordfence (Defiant) researchers recently discovered several vulnerabilities in the plugin, which could allow authenticated attackers with capabilities of a subscriber or above to modify arbitrary files, including PHP files.

This would then allow attackers to perform remote code execution on the server of a vulnerable site. Another possible scenario based on the vulnerabilities in XCloner Backup and Restore plugin is creating an exploit chain to obtain a database dump. In addition, the plugin also contained several endpoints, vulnerable to CSRF attacks (cross-site request forgery).

Fortunately, after the researchers got in touch with the plugin’s developers, an initial patch was quickly released to fix the most severe issue. An additional one followed to resolve the remaining problems.

Since the issues are considered critical, they could lead to remote code execution on a vulnerable site’s server. Updating to the fully patched version, 4.2.153, is highly recommended.

XCloner Backup and Restore Plugin: Critical Vulnerabilities

The first vulnerability is described as “Unprotected AJAX Action to Arbitrary File Overwrite and Sensitive Information Disclosure.”

Most of the plugin’s functionality is based on various AJAX actions that don’t require the page to refresh every time. The most critical of these functions that could have been exploited by attackers is the write_file_action one, which would allow users with subscriber-level to overwrite any files, including wp-config.php, which contains WordPress database credentials, among other important data.

Exploiting this vulnerability means an attacker could overwrite the wp-config.php to an empty file so that WordPress is tricked into thinking there is a new installation. This would then allow an attacker to connect their own database to an affected site and modify any files once they have re-configured the WordPress installation. Alternatively, an attacker could overwrite any other file with a backdoor and use that to gain access to the website’s entire filesystem, the Wordfence team explained in their report.

The other vulnerability in the XCloner Backup and Restore plugin is described as Cross-Site Request Forgery. Besides the almost entirely exposed AJAX endpoint, nearly all of the plugin endpoints were vulnerable to cross-site request forgery. This vulnerability stems from a failure to implement nonces and corresponding checks. A CSRF attack could trigger the backup or update options in the plugin, together with all other malicious activities posed by the vulnerabilities.


The security of your WordPress site should be a top concern. Because we know how important web security is, we prepared some useful articles to provide you with valuable insight:

What is Web Security?
Web Security: 3 Common Misconceptions That Put Your Website at Risk

Researched and created by:
Krum Popov
Passionate web entrepreneur, has been crafting web projects since 2007. In 2020, he founded HTH.Guide — a visionary platform dedicated to streamlining the search for the perfect web hosting solution. Read more...
Technically reviewed by:
Metodi Ivanov
Seasoned web development expert with 8+ years of experience, including specialized knowledge in hosting environments. His expertise guarantees that the content meets the highest standards in accuracy and aligns seamlessly with hosting technologies. Read more...

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree
At HTH.Guide, we offer transparent web hosting reviews, ensuring independence from external influences. Our evaluations are unbiased as we apply strict and consistent standards to all reviews.
While we may earn affiliate commissions from some of the companies featured, these commissions do not compromise the integrity of our reviews or influence our rankings.
The affiliate earnings contribute to covering account acquisition, testing expenses, maintenance, and development of our website and internal systems.
Trust HTH.Guide for reliable hosting insights and sincerity.