CVE-2025-12654: CWE-73 External Control of File Name or Path in wpvividplugins Migration, Backup, Staging – WPvivid Backup & Migration
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary directory creation in all versions up to, and including, 0.9.120. This is due to the check_filesystem_permissions() function not properly restricting the directories that can be created, or in what location. This makes it possible for authenticated attackers, with Administrator-level access and above, to create arbitrary directories.
AI Analysis
Technical Summary
CVE-2025-12654 is a vulnerability identified in the Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress, affecting all versions up to and including 0.9.120. The root cause lies in the check_filesystem_permissions() function, which fails to properly restrict where directories can be created or what directory names are allowed. This flaw permits authenticated users with Administrator-level privileges or higher to create arbitrary directories anywhere within the file system accessible by the web server. While the vulnerability does not allow unauthenticated access or direct code execution, the ability to create directories arbitrarily can be leveraged for further attacks, such as placing malicious files or manipulating plugin behavior. The CVSS v3.1 score is 2.7 (low severity), reflecting that the attack vector is network-based, requires high privileges, no user interaction, and impacts integrity but not confidentiality or availability. No public exploits or active exploitation have been reported. The vulnerability is categorized under CWE-73 (External Control of File Name or Path), indicating improper validation of filesystem paths. Since the plugin is widely used for WordPress backup and migration, this vulnerability could affect many websites relying on it for critical data management tasks. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for cautious administrative controls and monitoring.
Potential Impact
For European organizations, the primary impact of CVE-2025-12654 is on the integrity of their WordPress environments. Unauthorized directory creation by an administrator-level attacker could facilitate the placement of malicious files, potentially leading to privilege escalation, persistence, or disruption of backup and migration processes. Although confidentiality and availability are not directly affected, the integrity compromise could undermine trust in backup data and staging environments, critical for disaster recovery and site maintenance. Organizations relying heavily on WPvivid Backup & Migration for data protection may face increased risk of data manipulation or operational disruption if attackers exploit this flaw. Given the requirement for administrator privileges, the threat is more significant in environments with weak access controls or compromised administrator accounts. European entities with stringent data protection regulations (e.g., GDPR) must consider the risk of indirect data exposure or compliance violations stemming from integrity breaches. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially in targeted campaigns against high-value websites.
Mitigation Recommendations
1. Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor filesystem changes on WordPress servers, especially directory creation events, using file integrity monitoring tools to detect suspicious activity early. 3. Regularly audit installed plugins and their versions; avoid using outdated or unsupported versions of WPvivid Backup & Migration. 4. Apply plugin updates promptly once a patch addressing CVE-2025-12654 is released by the vendor. 5. Implement least privilege principles by limiting the number of users with administrator-level access and reviewing permissions periodically. 6. Consider isolating backup and migration operations in segregated environments or containers to limit the impact of potential exploitation. 7. Conduct security awareness training for administrators to recognize and report unusual system behavior. 8. Use web application firewalls (WAFs) with custom rules to detect and block anomalous requests related to directory manipulation if feasible. 9. Backup critical website data independently and verify backup integrity regularly to ensure recovery capability in case of compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-12654: CWE-73 External Control of File Name or Path in wpvividplugins Migration, Backup, Staging – WPvivid Backup & Migration
Description
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary directory creation in all versions up to, and including, 0.9.120. This is due to the check_filesystem_permissions() function not properly restricting the directories that can be created, or in what location. This makes it possible for authenticated attackers, with Administrator-level access and above, to create arbitrary directories.
AI-Powered Analysis
Technical Analysis
CVE-2025-12654 is a vulnerability identified in the Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress, affecting all versions up to and including 0.9.120. The root cause lies in the check_filesystem_permissions() function, which fails to properly restrict where directories can be created or what directory names are allowed. This flaw permits authenticated users with Administrator-level privileges or higher to create arbitrary directories anywhere within the file system accessible by the web server. While the vulnerability does not allow unauthenticated access or direct code execution, the ability to create directories arbitrarily can be leveraged for further attacks, such as placing malicious files or manipulating plugin behavior. The CVSS v3.1 score is 2.7 (low severity), reflecting that the attack vector is network-based, requires high privileges, no user interaction, and impacts integrity but not confidentiality or availability. No public exploits or active exploitation have been reported. The vulnerability is categorized under CWE-73 (External Control of File Name or Path), indicating improper validation of filesystem paths. Since the plugin is widely used for WordPress backup and migration, this vulnerability could affect many websites relying on it for critical data management tasks. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for cautious administrative controls and monitoring.
Potential Impact
For European organizations, the primary impact of CVE-2025-12654 is on the integrity of their WordPress environments. Unauthorized directory creation by an administrator-level attacker could facilitate the placement of malicious files, potentially leading to privilege escalation, persistence, or disruption of backup and migration processes. Although confidentiality and availability are not directly affected, the integrity compromise could undermine trust in backup data and staging environments, critical for disaster recovery and site maintenance. Organizations relying heavily on WPvivid Backup & Migration for data protection may face increased risk of data manipulation or operational disruption if attackers exploit this flaw. Given the requirement for administrator privileges, the threat is more significant in environments with weak access controls or compromised administrator accounts. European entities with stringent data protection regulations (e.g., GDPR) must consider the risk of indirect data exposure or compliance violations stemming from integrity breaches. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially in targeted campaigns against high-value websites.
Mitigation Recommendations
1. Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor filesystem changes on WordPress servers, especially directory creation events, using file integrity monitoring tools to detect suspicious activity early. 3. Regularly audit installed plugins and their versions; avoid using outdated or unsupported versions of WPvivid Backup & Migration. 4. Apply plugin updates promptly once a patch addressing CVE-2025-12654 is released by the vendor. 5. Implement least privilege principles by limiting the number of users with administrator-level access and reviewing permissions periodically. 6. Consider isolating backup and migration operations in segregated environments or containers to limit the impact of potential exploitation. 7. Conduct security awareness training for administrators to recognize and report unusual system behavior. 8. Use web application firewalls (WAFs) with custom rules to detect and block anomalous requests related to directory manipulation if feasible. 9. Backup critical website data independently and verify backup integrity regularly to ensure recovery capability in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-03T20:38:20.329Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694770dcdaa649f7237704bb
Added to database: 12/21/2025, 4:00:28 AM
Last enriched: 12/21/2025, 4:01:45 AM
Last updated: 12/21/2025, 7:06:05 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14995: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14994: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14855: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brainstormforce SureForms – Contact Form, Payment Form & Other Custom Form Builder
HighCVE-2025-14800: CWE-434 Unrestricted Upload of File with Dangerous Type in themeisle Redirection for Contact Form 7
HighCVE-2025-14993: Stack-based Buffer Overflow in Tenda AC18
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.