Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3054: CWE-502 Deserialization of Untrusted Data in wpvividplugins Migration, Backup, Staging – WPvivid

0
High
VulnerabilityCVE-2024-3054cvecve-2024-3054cwe-502
Published: Fri Apr 12 2024 (04/12/2024, 09:30:15 UTC)
Source: CVE Database V5
Vendor/Project: wpvividplugins
Product: Migration, Backup, Staging – WPvivid

Description

CVE-2024-3054 is a high-severity vulnerability in the WPvivid Backup & Migration WordPress plugin affecting all versions up to 0. 9. 99. It involves PHAR deserialization of untrusted data via insufficient validation of the tree_node[node][id] parameter in the wpvividstg_get_custom_exclude_path_free action. Exploitation requires authenticated users with admin-level privileges or higher. The vulnerability allows attackers to deserialize arbitrary PHP objects, potentially leading to arbitrary code execution, file deletion, or data disclosure if a gadget chain is present through other plugins or themes. No public exploits are known yet. The CVSS score is 7. 2, reflecting high impact on confidentiality, integrity, and availability. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent severe compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:01:55 UTC

Technical Analysis

The WPvivid Backup & Migration plugin for WordPress suffers from a deserialization vulnerability (CWE-502) identified as CVE-2024-3054. This vulnerability arises from inadequate validation of the tree_node[node][id] parameter in the wpvividstg_get_custom_exclude_path_free action, which processes user-supplied input. Specifically, the plugin allows deserialization of PHAR (PHP Archive) files, which can contain serialized PHP objects. An authenticated attacker with admin or higher privileges can exploit this by crafting malicious PHAR files that, when deserialized, instantiate arbitrary PHP objects. Although the plugin itself lacks a gadget chain (POP chain) necessary for direct code execution, the presence of additional vulnerable plugins or themes on the target system could provide such chains. This could enable attackers to execute arbitrary code, delete files, or access sensitive data. The vulnerability affects all versions up to and including 0.9.99 and was published on April 12, 2024. The CVSS v3.1 score of 7.2 indicates a high-severity issue with network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No patches or public exploits are currently available, but the risk remains significant due to the potential for chained exploitation.

Potential Impact

If exploited, this vulnerability could lead to severe consequences for affected organizations. Attackers with admin-level access could leverage the deserialization flaw to execute arbitrary PHP code, delete critical files, or exfiltrate sensitive information. This compromises the confidentiality, integrity, and availability of the WordPress site and potentially the underlying server environment. Given that WordPress sites often serve as public-facing portals or e-commerce platforms, exploitation could result in website defacement, data breaches, service disruption, and loss of customer trust. The requirement for admin privileges limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or compromised credentials. Additionally, the possibility of chaining this vulnerability with other plugins or themes increases the attack complexity and potential impact. Organizations relying on WPvivid for backup and migration should consider this a critical risk to their operational security.

Mitigation Recommendations

Organizations should immediately verify the version of WPvivid Backup & Migration plugin in use and upgrade to a patched version once available. In the absence of an official patch, administrators should restrict admin-level access strictly and audit existing admin accounts for suspicious activity. Implementing Web Application Firewalls (WAFs) with rules to detect and block PHAR wrapper usage or suspicious serialized payloads can provide temporary protection. Disable or remove unnecessary plugins and themes that could provide gadget chains to reduce the risk of chained exploitation. Regularly monitor logs for unusual deserialization attempts or unexpected file access patterns. Additionally, consider isolating WordPress environments and employing least privilege principles to limit the impact of any compromise. Backup data should be verified for integrity and stored securely to prevent tampering via this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-03-28T19:47:17.647Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c8ab7ef31ef0b56613b

Added to database: 2/25/2026, 9:41:30 PM

Last enriched: 2/26/2026, 6:01:55 AM

Last updated: 2/26/2026, 8:08:12 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats