PT-2026-7477 · WordPress +1 · Wpvivid Backup/Migration +1
Lucas Montes
·
Published
2026-02-10
·
Updated
2026-02-13
·
CVE-2026-1357
CVSS v3.1
9.8
9.8
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
WPvivid Backup & Migration versions up to and including 0.9.123
Description
The WPvivid Backup & Migration plugin for WordPress is susceptible to an unauthenticated arbitrary file upload, potentially leading to remote code execution. This issue stems from improper error handling during RSA decryption and insufficient path sanitization when handling uploaded files. Specifically, when the plugin fails to decrypt a session key, it doesn't halt execution but instead passes a false value to the AES cipher initialization, which is interpreted as null bytes. This allows attackers to encrypt malicious payloads with a predictable key. The lack of filename sanitization then enables directory traversal, allowing attackers to upload arbitrary PHP files to publicly accessible directories via the
wpvivid action=send to site parameter. The vulnerability is primarily exploitable when the "receive backup from another site" feature is enabled, with a 24-hour key window. Approximately 800,000 to 900,000 WordPress sites are estimated to be affected.Recommendations
Update the WPvivid Backup & Migration plugin to version 0.9.124 or later.
If the "receive backup from another site" feature is enabled, consider disabling it unless absolutely necessary.
Fix
RCE
Unrestricted File Upload
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2026-1357
Affected Products
Wpvivid Backup/Migration
Phpseclib
References · 26
- https://nvd.nist.gov/vuln/detail/CVE-2026-1357 · Security Note
- https://reddit.com/r/u_hackrepair/comments/1r21ros/discussion_critical_vulnerability_in_wpvivid · Reddit Post
- https://twitter.com/VulmonFeeds/status/2021785107074355207 · Twitter Post
- https://wordfence.com/threat-intel/vulnerabilities/id/e5af0317-ef46-4744-9752-74ce228b5f37?source=cve · Note
- https://twitter.com/CveFindCom/status/2021633117388169530 · Twitter Post
- https://twitter.com/NewsNerdie/status/2022212121480561111 · Twitter Post
- https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/trunk/includes/class-wpvivid-crypt.php#L58 · Note
- https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/trunk/includes/customclass/class-wpvivid-send-to-site.php#L629 · Note
- https://twitter.com/hackeraffairs/status/2022246370233717120 · Twitter Post
- https://twitter.com/VolerionSec/status/2021469400490975313 · Twitter Post
- https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/tags/0.9.122/includes/customclass/class-wpvivid-send-to-site.php#L629 · Note
- https://i.redd.it/7h3pnfwmhqig1.png · Reddit Post
- https://twitter.com/vuln_tracker/status/2021532935724396941 · Twitter Post
- https://t.me/proxy_bar/3136 · Telegram Post
- https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/tags/0.9.123/includes/customclass/class-wpvivid-send-to-site.php#L629 · Note