This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π‘οΈ **Root Cause**: CWE-548 (Information Exposure Through Directory Listing). <br>π **Flaw**: The plugin fails to block directory listing in the sensitive 'prime-mover-export-files/' folder.β¦
π¦ **Affected**: WordPress Plugin: **Migrate WordPress Website & Backups** (also known as Prime Mover). <br>π **Versions**: All versions **up to and including 1.9.2**.β¦
π **Threshold**: **LOW**. <br>π€ **Auth**: **Unauthenticated**. No login required. <br>βοΈ **Config**: Default directory structure is exposed. Easy to find via simple URL guessing. π―
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Public Exp**: **YES**. <br>π **PoC**: Available via **Nuclei Templates** (ProjectDiscovery). <br>π **Wild Exp**: High risk due to simplicity. Automated scanners can detect this easily. π€
π οΈ **Fix**: **YES**. <br>π¦ **Patch**: Upgrade plugin to version **1.9.3 or later**. <br>β **Official**: Update via WordPress admin dashboard. Ensure directory listing is disabled by the new version. π
Q9What if no patch? (Workaround)
π§ **Workaround (No Patch)**: <br>1. **Delete** the 'prime-mover-export-files' folder if not in use. <br>2. Add `Options -Indexes` to `.htaccess` (Apache). <br>3. Configure Nginx to deny directory listing. π
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **HIGH**. <br>β‘ **Priority**: Patch immediately. <br>π **Risk**: Sensitive data (hashes/configs) is exposed to the public internet. Low effort for attackers. π¨