Cyber Posture

CWE · MITRE source

CWE-530Exposure of Backup File to an Unauthorized Control Sphere

Abstraction: Variant · CVEs in our corpus: 10

A backup file is stored in a directory or archive that is made accessible to unauthorized actors.

Often, older backup files are renamed with an extension such as .~bk to distinguish them from production files. The source code for old files that have been renamed in this manner and left in the webroot can often be retrieved. This renaming may have been performed automatically by the web server, or manually by the administrator.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (0)AI

Control Title Family Why it addresses this CWE
No NIST controls proposed yet.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-123301.67.50.01012025-01-09
CVE-2020-368991.57.50.00532025-12-10
CVE-2025-37731.15.50.00072025-06-26
CVE-2023-52970.73.70.00072023-09-29
CVE-2024-31240.52.40.00032024-04-01
CVE-2024-31280.52.40.00032024-04-01
CVE-2024-34300.52.40.00032024-04-07
CVE-2026-29740.52.50.00012026-02-23
CVE-2024-23640.41.80.00032024-03-10
CVE-2024-25670.41.80.00032024-03-17