Arbitrary File Upload Vulnerability in WPvivid Backup & Migration Plugin for WordPress
CVE-2024-13869
Key Information:
- Vendor
- WPvividplugins
- Status
- Migration, Backup, Staging β WPvivid Backup & Migration
- Vendor
- CVE Published:
- 22 February 2025
Badges
Summary
The WPvivid Backup & Migration plugin for WordPress has a vulnerability that allows authenticated users with Administrator-level access to upload arbitrary files to the server. This security flaw is rooted in inadequate file type validation within the 'upload_files' function, affecting all versions up to and including 0.9.112. Although the uploaded files can only be accessed on NGINX web servers due to protective .htaccess rules in place for the upload folder, this vulnerability exposes significant risks, potentially enabling remote code execution.
Affected Version(s)
Migration, Backup, Staging β WPvivid Backup & Migration * <= 0.9.112
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
Vulnerability published
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability Reserved