INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 3h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 3h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 3h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h
Vulnerabilities

CVE-2020-11738

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
WordPress Snap Creek Duplicator Plugin File Download Vulnerability — WordPress Snap Creek Duplicator plugin contains a file download vulnerability when an administrator creates a new copy of their sit
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

WordPress Snap Creek Duplicator Plugin File Download Vulnerability — WordPress Snap Creek Duplicator plugin contains a file download vulnerability when an administrator creates a new copy of their site that allows an attacker to download the generated files from their Wordpress dashboard. This vulnerability affects Duplicator and Dulplicator Pro.

🤖 AI Executive Summary

CVE-2020-11738 is a critical file download vulnerability (CVSS 9.0) in the Snap Creek Duplicator and Duplicator Pro WordPress plugins. When a site administrator creates a backup or migration package, the generated archive files become accessible to unauthenticated or low-privileged attackers, potentially exposing sensitive site data including database credentials, configuration files, and user information. Active exploits are publicly available, making this a high-priority remediation target. Organizations running WordPress with this plugin must patch immediately to prevent unauthorized data exfiltration.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 18, 2026 08:32
🇸🇦 Saudi Arabia Impact Assessment
تُشكّل هذه الثغرة خطراً بالغاً على المؤسسات السعودية التي تعتمد على WordPress في إدارة مواقعها الإلكترونية. القطاعات الأكثر عرضة للخطر تشمل: القطاع الحكومي (الوزارات والهيئات التي تستخدم WordPress لبواباتها الإلكترونية)، قطاع التعليم (الجامعات والمدارس)، قطاع الرعاية الصحية (المستشفيات والعيادات)، والقطاع التجاري والتجزئة. الاستغلال الناجح يمكن أن يؤدي إلى تسريب بيانات اعتماد قواعد البيانات وملفات wp-config.php التي تحتوي على مفاتيح سرية، مما يفتح الباب أمام اختراق كامل للموقع وسرقة بيانات المستخدمين. في ظل متطلبات حماية البيانات الشخصية بموجب نظام حماية البيانات الشخصية السعودي (PDPL)، قد يُعرّض هذا الاختراق المؤسسات لعقوبات قانونية وتنظيمية صارمة.
🏢 Affected Saudi Sectors
Government Education Healthcare Retail Media Real Estate Non-Profit SME/Commercial
⚖️ Saudi Risk Score (AI)
8.7
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS (0-24 hours):
1. Update Duplicator plugin to version 1.3.28 or later and Duplicator Pro to the latest patched version immediately.
2. Delete all existing installer and backup package files from the WordPress uploads directory (/wp-content/uploads/).
3. Audit web server access logs for unauthorized access to installer.php, installer-backup.php, and .zip/.sql archive files.
4. Rotate all database credentials found in wp-config.php if exposure is suspected.
5. Temporarily disable the Duplicator plugin if patching cannot be done immediately.

PATCHING GUIDANCE:
- Navigate to WordPress Admin > Plugins > Update Available and apply the Duplicator update.
- Verify the installed version is 1.3.28+ via the plugin details page.
- For Duplicator Pro, download the latest version from the vendor portal and manually update.

COMPENSATING CONTROLS (if patch unavailable):
- Block public access to /wp-content/uploads/ directory via .htaccess or NGINX configuration rules.
- Implement IP allowlisting for WordPress admin dashboard access.
- Use a Web Application Firewall (WAF) rule to block requests to installer.php and backup archive files.
- Move backup files to a non-web-accessible directory immediately after creation.

DETECTION RULES:
- SIEM Alert: Monitor HTTP GET requests to paths matching */installer.php* or */wp-content/uploads/*.zip* from external IPs.
- WAF Rule: Block unauthenticated access to installer.php and backup archive files.
- File Integrity Monitoring: Alert on creation of new .zip or .sql files in the uploads directory.
- Splunk Query: index=web_logs uri_path=*installer.php* OR uri_path=*uploads/*.zip* | stats count by src_ip
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية (خلال 0-24 ساعة):
1. تحديث إضافة Duplicator إلى الإصدار 1.3.28 أو أحدث، وتحديث Duplicator Pro إلى أحدث إصدار مُصحَّح فوراً.
2. حذف جميع ملفات المثبّت والنسخ الاحتياطية الموجودة في مجلد التحميلات (/wp-content/uploads/).
3. مراجعة سجلات الوصول إلى خادم الويب للكشف عن أي وصول غير مصرح به إلى ملفات installer.php وملفات الأرشيف.
4. تغيير جميع بيانات اعتماد قاعدة البيانات الموجودة في ملف wp-config.php في حال الاشتباه بتعرضها للكشف.
5. تعطيل إضافة Duplicator مؤقتاً إذا تعذّر التحديث الفوري.

إرشادات التصحيح:
- الانتقال إلى لوحة تحكم WordPress > الإضافات > التحديثات المتاحة وتطبيق تحديث Duplicator.
- التحقق من أن الإصدار المثبت هو 1.3.28 أو أحدث.
- لـ Duplicator Pro، تنزيل أحدث إصدار من بوابة المورد وتحديثه يدوياً.

ضوابط التعويض (في حال عدم توفر التصحيح):
- حظر الوصول العام إلى مجلد /wp-content/uploads/ عبر قواعد .htaccess أو NGINX.
- تطبيق قائمة السماح بعناوين IP للوصول إلى لوحة تحكم WordPress.
- استخدام قواعد جدار حماية تطبيقات الويب (WAF) لحظر الطلبات إلى installer.php وملفات الأرشيف.
- نقل ملفات النسخ الاحتياطية إلى مجلد غير متاح عبر الويب فور إنشائها.

قواعد الكشف:
- تنبيه SIEM: مراقبة طلبات HTTP GET إلى مسارات تحتوي على */installer.php* أو */wp-content/uploads/*.zip* من عناوين IP خارجية.
- قاعدة WAF: حظر الوصول غير المصادق عليه إلى installer.php وملفات الأرشيف.
- مراقبة سلامة الملفات: التنبيه عند إنشاء ملفات .zip أو .sql جديدة في مجلد التحميلات.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-4-2: Cybersecurity Vulnerability Management ECC-2-3-1: Web Application Security ECC-1-3-6: Patch Management and Updates ECC-2-5-1: Data Protection and Privacy ECC-1-5-1: Cybersecurity Event Logging and Monitoring
🔵 SAMA CSF
Protect: PR.IP-12 — Vulnerability Management Plan Protect: PR.DS-1 — Data-at-Rest Protection Detect: DE.CM-7 — Monitoring for Unauthorized Activity Respond: RS.MI-3 — Newly Identified Vulnerabilities Mitigated Protect: PR.AC-3 — Remote Access Management
🟡 ISO 27001:2022
A.12.6.1 — Management of Technical Vulnerabilities A.14.2.2 — System Change Control Procedures A.10.1.1 — Policy on the Use of Cryptographic Controls A.12.4.1 — Event Logging A.18.1.3 — Protection of Records
🟣 PCI DSS v4.0
Requirement 6.3.3 — All System Components Protected from Known Vulnerabilities via Patching Requirement 6.2.4 — Software Development Practices to Prevent Vulnerabilities Requirement 10.2 — Audit Logs to Reconstruct Events Requirement 11.3.1 — External Vulnerability Scanning
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
WordPress:Snap Creek Duplicator Plugin
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.28%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-05-03
Published 2021-11-03
Source Feed cisa_kev
Views 3
🇸🇦 Saudi Risk Score
8.7
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.