PT-2026-7477 · Phpseclib+1 · Phpseclib+1
Lucas Montes
·
Published
2026-02-10
·
Updated
2026-03-12
·
CVE-2026-1357
CVSS v3.1
9.8
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
WPvivid Backup & Migration versions up to and including 0.9.123
Description
The WPvivid Backup & Migration plugin for WordPress is susceptible to an unauthenticated arbitrary file upload, potentially leading to Remote Code Execution (RCE). This issue stems from flawed error handling during RSA decryption and insufficient path sanitization when handling uploaded files. Specifically, when the plugin encounters an error during RSA decryption using
openssl private decrypt(), it fails to halt execution and incorrectly passes a boolean false value to the phpseclib library for AES cipher initialization. This library interprets the false value as a string of null bytes, enabling attackers to encrypt malicious payloads with a predictable null-byte key. Furthermore, the plugin lacks proper sanitization of filenames received from the decrypted payload, allowing directory traversal and the placement of malicious PHP files in publicly accessible directories. Exploitation occurs via the wpvivid action=send to site parameter. Approximately 800,000 to 900,000 WordPress sites are estimated to be affected.Recommendations
Update the WPvivid Backup & Migration plugin to version 0.9.124 or later immediately.
Exploit
Fix
RCE
Unrestricted File Upload
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Wpvivid Backup/Migration
Phpseclib