Browse all 5 CVE security advisories affecting migrate. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Migrate is primarily used for data transfer and system transition operations across environments. Historically, it has been associated with multiple remote code execution (RCE) vulnerabilities, often stemming from improper input validation and insecure deserialization. Cross-site scripting (XSS) and privilege escalation flaws have also been prevalent, particularly in versions prior to 2.3. The project maintains a moderate CVE count with five recorded vulnerabilities, though no major public security incidents have been documented. Recent versions have shown improved security practices, including better sanitization of user inputs and stricter access controls, though legacy deployments may remain at risk if not properly updated.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-25486 | WordPress Clone plugin <= 2.3.7 - Broken Access Control vulnerability — CloneCWE-862 | 4.3 | Medium | 2024-12-09 |
| CVE-2024-10913 | Clone <= 2.4.6 - Unauthenticated PHP Object Injection via 'recursive_unserialized_replace' — CloneCWE-502 | 8.8 | High | 2024-11-20 |
| CVE-2024-43297 | WordPress Clone plugin <= 2.4.5 - Broken Access Control vulnerability — CloneCWE-862 | 4.3 | Medium | 2024-11-01 |
| CVE-2024-43298 | WordPress Clone plugin <= 2.4.5 - Broken Access Control vulnerability — CloneCWE-862 | 4.3 | Medium | 2024-11-01 |
| CVE-2023-6971 | WordPress plugin Backup Migration 安全漏洞 — Backup Migration | 8.1 | High | 2023-12-23 |
This page lists every published CVE security advisory associated with migrate. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.