CVE-2025-12654: CWE-73 External Control of File Name or Path in wpvividplugins Migration, Backup, Staging – WPvivid Backup & Migration
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary directory creation in all versions up to, and including, 0.9.120. This is due to the check_filesystem_permissions() function not properly restricting the directories that can be created, or in what location. This makes it possible for authenticated attackers, with Administrator-level access and above, to create arbitrary directories.
AI Analysis
Technical Summary
CVE-2025-12654 identifies a security vulnerability in the Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress, affecting all versions up to and including 0.9.120. The vulnerability stems from the check_filesystem_permissions() function, which fails to properly restrict directory creation to safe locations or enforce strict directory naming controls. As a result, authenticated users with Administrator-level privileges or higher can create arbitrary directories anywhere within the file system accessible to the plugin. This is classified under CWE-73 (External Control of File Name or Path), indicating that external input improperly influences file or directory paths. The vulnerability does not allow direct code execution or data disclosure but can undermine system integrity by enabling attackers to create directories that may be used for malicious payload storage, log manipulation, or to facilitate privilege escalation in chained attacks. The CVSS v3.1 base score is 2.7, reflecting low severity due to the requirement for high privileges and no direct impact on confidentiality or availability. No patches or exploits are currently publicly available, but the issue is published and should be addressed by plugin maintainers. The vulnerability is network exploitable but requires authenticated administrator access, limiting its attack surface primarily to compromised or insider accounts.
Potential Impact
The primary impact of this vulnerability is on system integrity, as attackers with administrator access can create arbitrary directories, potentially enabling further malicious activities such as planting backdoors, manipulating backups, or interfering with site operations. Although it does not directly compromise confidentiality or availability, the ability to control directory creation can facilitate more complex attack chains, including privilege escalation or persistence mechanisms. Organizations relying on WPvivid Backup & Migration for critical backup and migration tasks may face risks of data tampering or disruption of backup integrity. The requirement for administrator-level authentication reduces the likelihood of remote exploitation by external attackers but increases risk from insider threats or compromised admin accounts. The vulnerability could also complicate incident response and recovery if attackers use created directories to hide malicious files or logs. Overall, the impact is moderate in environments with strong access controls but could be more severe where admin credentials are weak or shared.
Mitigation Recommendations
1. Restrict administrative access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of compromised admin accounts. 2. Monitor and audit directory creation activities within the WordPress installation, focusing on unusual or unexpected directory paths created by the WPvivid plugin. 3. Apply security patches promptly once the plugin vendor releases updates addressing this vulnerability. 4. In the absence of an immediate patch, consider temporarily disabling or limiting the use of the WPvivid Backup & Migration plugin, especially on high-value or production sites. 5. Implement file system integrity monitoring tools to detect unauthorized directory or file creation. 6. Review and harden WordPress file permissions to limit the plugin’s ability to write outside intended directories. 7. Educate administrators about the risks of this vulnerability and encourage vigilance for suspicious activity. 8. Regularly back up WordPress sites using alternative trusted methods to ensure recovery capability in case of compromise.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands
CVE-2025-12654: CWE-73 External Control of File Name or Path in wpvividplugins Migration, Backup, Staging – WPvivid Backup & Migration
Description
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary directory creation in all versions up to, and including, 0.9.120. This is due to the check_filesystem_permissions() function not properly restricting the directories that can be created, or in what location. This makes it possible for authenticated attackers, with Administrator-level access and above, to create arbitrary directories.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12654 identifies a security vulnerability in the Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress, affecting all versions up to and including 0.9.120. The vulnerability stems from the check_filesystem_permissions() function, which fails to properly restrict directory creation to safe locations or enforce strict directory naming controls. As a result, authenticated users with Administrator-level privileges or higher can create arbitrary directories anywhere within the file system accessible to the plugin. This is classified under CWE-73 (External Control of File Name or Path), indicating that external input improperly influences file or directory paths. The vulnerability does not allow direct code execution or data disclosure but can undermine system integrity by enabling attackers to create directories that may be used for malicious payload storage, log manipulation, or to facilitate privilege escalation in chained attacks. The CVSS v3.1 base score is 2.7, reflecting low severity due to the requirement for high privileges and no direct impact on confidentiality or availability. No patches or exploits are currently publicly available, but the issue is published and should be addressed by plugin maintainers. The vulnerability is network exploitable but requires authenticated administrator access, limiting its attack surface primarily to compromised or insider accounts.
Potential Impact
The primary impact of this vulnerability is on system integrity, as attackers with administrator access can create arbitrary directories, potentially enabling further malicious activities such as planting backdoors, manipulating backups, or interfering with site operations. Although it does not directly compromise confidentiality or availability, the ability to control directory creation can facilitate more complex attack chains, including privilege escalation or persistence mechanisms. Organizations relying on WPvivid Backup & Migration for critical backup and migration tasks may face risks of data tampering or disruption of backup integrity. The requirement for administrator-level authentication reduces the likelihood of remote exploitation by external attackers but increases risk from insider threats or compromised admin accounts. The vulnerability could also complicate incident response and recovery if attackers use created directories to hide malicious files or logs. Overall, the impact is moderate in environments with strong access controls but could be more severe where admin credentials are weak or shared.
Mitigation Recommendations
1. Restrict administrative access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of compromised admin accounts. 2. Monitor and audit directory creation activities within the WordPress installation, focusing on unusual or unexpected directory paths created by the WPvivid plugin. 3. Apply security patches promptly once the plugin vendor releases updates addressing this vulnerability. 4. In the absence of an immediate patch, consider temporarily disabling or limiting the use of the WPvivid Backup & Migration plugin, especially on high-value or production sites. 5. Implement file system integrity monitoring tools to detect unauthorized directory or file creation. 6. Review and harden WordPress file permissions to limit the plugin’s ability to write outside intended directories. 7. Educate administrators about the risks of this vulnerability and encourage vigilance for suspicious activity. 8. Regularly back up WordPress sites using alternative trusted methods to ensure recovery capability in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-03T20:38:20.329Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694770dcdaa649f7237704bb
Added to database: 12/21/2025, 4:00:28 AM
Last enriched: 2/27/2026, 8:54:22 PM
Last updated: 3/24/2026, 1:26:27 PM
Views: 94
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.