xcloner CVE Vulnerabilities & Metrics

Focus on xcloner vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About xcloner Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with xcloner. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total xcloner CVEs: 11
Earliest CVE date: 03 Apr 2014, 16:15 UTC
Latest CVE date: 01 Jan 2021, 04:15 UTC

Latest CVE reference: CVE-2020-35950

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical xcloner CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.56

Max CVSS: 7.6

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 2
4.0-6.9 10
7.0-8.9 2
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS xcloner CVEs

These are the five CVEs with the highest CVSS scores for xcloner, sorted by severity first and recency.

All CVEs for xcloner

CVE-2020-35950 xcloner vulnerability CVSS: 6.8 01 Jan 2021, 04:15 UTC

An issue was discovered in the XCloner Backup and Restore plugin before 4.2.153 for WordPress. It allows CSRF (via almost any endpoint).

CVE-2020-35948 xcloner vulnerability CVSS: 6.5 01 Jan 2021, 04:15 UTC

An issue was discovered in the XCloner Backup and Restore plugin before 4.2.13 for WordPress. It gave authenticated attackers the ability to modify arbitrary files, including PHP files. Doing so would allow an attacker to achieve remote code execution. The xcloner_restore.php write_file_action could overwrite wp-config.php, for example. Alternatively, an attacker could create an exploit chain to obtain a database dump.

CVE-2020-13424 xcloner vulnerability CVSS: 4.0 23 May 2020, 19:15 UTC

The XCloner component before 3.5.4 for Joomla! allows Authenticated Local File Disclosure.

CVE-2015-4338 xcloner vulnerability CVSS: 6.5 17 Jun 2015, 18:59 UTC

Static code injection vulnerability in the XCloner plugin 3.1.2 for WordPress allows remote authenticated users to inject arbitrary PHP code into the language files via a Translation LM_FRONT_* field for a language, as demonstrated by language/italian.php.

CVE-2015-4337 xcloner vulnerability CVSS: 3.5 17 Jun 2015, 18:59 UTC

Cross-site scripting (XSS) vulnerability in the XCloner plugin 3.1.2 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the excl_manual parameter in the xcloner_show page to wpadmin/plugins.php.

CVE-2015-4336 xcloner vulnerability CVSS: 6.5 17 Jun 2015, 18:59 UTC

cloner.functions.php in the XCloner plugin 3.1.2 for WordPress allows remote authenticated users to execute arbitrary commands via a file containing filenames with shell metacharacters, as demonstrated by using the backup comments feature to create the file.

CVE-2014-8607 xcloner vulnerability CVSS: 2.1 10 Jun 2015, 18:59 UTC

The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! provides the MySQL username and password on the command line, which allows local users to obtain sensitive information via the ps command.

CVE-2014-8606 xcloner vulnerability CVSS: 4.0 10 Jun 2015, 18:59 UTC

Directory traversal vulnerability in the XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! allows remote administrators to read arbitrary files via a .. (dot dot) in the file parameter in a json_return action in the xcloner_show page to wp-admin/admin-ajax.php.

CVE-2014-8605 xcloner vulnerability CVSS: 5.0 10 Jun 2015, 18:59 UTC

The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! stores database backup files with predictable names under the web root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to a backup file in administrators/backups/.

CVE-2014-8604 xcloner vulnerability CVSS: 5.0 10 Jun 2015, 18:59 UTC

The XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! returns the MySQL password in cleartext to a text box in the configuration panel, which allows remote attackers to obtain sensitive information via unspecified vectors.

CVE-2014-8603 xcloner vulnerability CVSS: 6.5 10 Jun 2015, 18:59 UTC

cloner.functions.php in the XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! allows remote administrators to execute arbitrary code via shell metacharacters in the (1) file name when creating a backup or vectors related to the (2) $_CONFIG[tarpath], (3) $exclude, (4) $_CONFIG['tarcompress'], (5) $_CONFIG['filename'], (6) $_CONFIG['exfile_tar'], (7) $_CONFIG[sqldump], (8) $_CONFIG['mysql_host'], (9) $_CONFIG['mysql_pass'], (10) $_CONFIG['mysql_user'], (11) $database_name, or (12) $sqlfile variable.

CVE-2014-2996 xcloner vulnerability CVSS: 7.1 25 Apr 2014, 20:55 UTC

XCloner Standalone 3.5 and earlier, when enable_db_backup and sql_mem are enabled, allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the dbbackup_comp parameter in a generate action to index2.php. NOTE: it is not clear whether this issue crosses privilege boundaries, since administrators might already have the privileges to execute code. NOTE: this can be leveraged by remote attackers using CVE-2014-2579.

CVE-2014-2579 xcloner vulnerability CVSS: 7.6 25 Apr 2014, 20:55 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities in XCloner Standalone 3.5 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) change the administrator password via the config task to index2.php or (2) when the enable_db_backup and sql_mem options are enabled, access the database backup functionality via the dbbackup_comp parameter in the generate action to index2.php. NOTE: vector 2 might be a duplicate of CVE-2014-2340, which is for the XCloner Wordpress plugin. NOTE: remote attackers can leverage CVE-2014-2996 with vector 2 to execute arbitrary commands.

CVE-2014-2340 xcloner vulnerability CVSS: 6.8 03 Apr 2014, 16:15 UTC

Cross-site request forgery (CSRF) vulnerability in the XCloner plugin before 3.1.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that create website backups via a request to wp-admin/plugins.php.