CVE-2025-5961: CWE-434 Unrestricted Upload of File with Dangerous Type in wpvividplugins Migration, Backup, Staging – WPvivid Backup & Migration
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpvivid_upload_import_files' function in all versions up to, and including, 0.9.116. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-5961 affects the WPvivid Backup & Migration plugin for WordPress, specifically versions up to and including 0.9.116. The root cause is the absence of proper file type validation in the 'wpvivid_upload_import_files' function, which handles file uploads during migration, backup, or staging operations. This weakness allows an authenticated attacker with administrator-level privileges to upload arbitrary files to the server hosting the WordPress instance. Since the plugin does not restrict the types of files uploaded, malicious files such as web shells or scripts can be placed on the server. The critical aspect of this vulnerability is that on WordPress sites running the NGINX web server, these uploaded files are accessible and can be executed, potentially leading to remote code execution (RCE). In contrast, Apache servers benefit from existing .htaccess rules in the upload directory that block direct access to these files, mitigating the risk of exploitation on those platforms. The CVSS 3.1 base score is 7.2, reflecting high severity due to network attack vector, low attack complexity, required high privileges, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant risk given the widespread use of WordPress and the popularity of this plugin for backup and migration tasks. The vulnerability is classified under CWE-434, which concerns unrestricted file upload vulnerabilities that can lead to code execution or other malicious outcomes.
Potential Impact
If exploited, this vulnerability can have severe consequences for organizations worldwide. An attacker with administrator access can upload malicious files that may execute arbitrary code on the server, leading to full system compromise. This can result in data theft, defacement, installation of persistent backdoors, or use of the compromised server as a pivot point for further attacks within the network. The confidentiality, integrity, and availability of the affected WordPress sites and their underlying infrastructure are at risk. Organizations relying on WPvivid Backup & Migration for critical backup and migration operations may face service disruptions and loss of trust from their users or customers. Since the vulnerability is exploitable only on NGINX web servers, organizations using this web server with the affected plugin are at higher risk. The requirement for administrator privileges limits the attack surface but does not eliminate the threat, especially if administrator accounts are compromised or insider threats exist. The absence of known exploits in the wild suggests the window for proactive mitigation is still open, but the potential impact warrants urgent attention.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the WPvivid Backup & Migration plugin to a patched version once available. In the absence of an official patch, administrators should restrict plugin usage to trusted personnel only and audit administrator accounts for suspicious activity. Implementing additional file upload validation at the web server or application level can help block dangerous file types. For NGINX servers, configuring strict access controls and disabling execution permissions in the upload directories can reduce risk. Monitoring file uploads and scanning for web shells or suspicious files regularly is recommended. Employing Web Application Firewalls (WAFs) with rules targeting arbitrary file uploads can provide an additional layer of defense. Organizations should also review and harden their WordPress administrator account security by enforcing strong authentication mechanisms and limiting the number of administrators. Finally, maintaining regular backups and having an incident response plan tailored for web application compromises will aid in rapid recovery if exploitation occurs.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, India, Brazil
CVE-2025-5961: CWE-434 Unrestricted Upload of File with Dangerous Type in wpvividplugins Migration, Backup, Staging – WPvivid Backup & Migration
Description
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpvivid_upload_import_files' function in all versions up to, and including, 0.9.116. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2025-5961 affects the WPvivid Backup & Migration plugin for WordPress, specifically versions up to and including 0.9.116. The root cause is the absence of proper file type validation in the 'wpvivid_upload_import_files' function, which handles file uploads during migration, backup, or staging operations. This weakness allows an authenticated attacker with administrator-level privileges to upload arbitrary files to the server hosting the WordPress instance. Since the plugin does not restrict the types of files uploaded, malicious files such as web shells or scripts can be placed on the server. The critical aspect of this vulnerability is that on WordPress sites running the NGINX web server, these uploaded files are accessible and can be executed, potentially leading to remote code execution (RCE). In contrast, Apache servers benefit from existing .htaccess rules in the upload directory that block direct access to these files, mitigating the risk of exploitation on those platforms. The CVSS 3.1 base score is 7.2, reflecting high severity due to network attack vector, low attack complexity, required high privileges, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant risk given the widespread use of WordPress and the popularity of this plugin for backup and migration tasks. The vulnerability is classified under CWE-434, which concerns unrestricted file upload vulnerabilities that can lead to code execution or other malicious outcomes.
Potential Impact
If exploited, this vulnerability can have severe consequences for organizations worldwide. An attacker with administrator access can upload malicious files that may execute arbitrary code on the server, leading to full system compromise. This can result in data theft, defacement, installation of persistent backdoors, or use of the compromised server as a pivot point for further attacks within the network. The confidentiality, integrity, and availability of the affected WordPress sites and their underlying infrastructure are at risk. Organizations relying on WPvivid Backup & Migration for critical backup and migration operations may face service disruptions and loss of trust from their users or customers. Since the vulnerability is exploitable only on NGINX web servers, organizations using this web server with the affected plugin are at higher risk. The requirement for administrator privileges limits the attack surface but does not eliminate the threat, especially if administrator accounts are compromised or insider threats exist. The absence of known exploits in the wild suggests the window for proactive mitigation is still open, but the potential impact warrants urgent attention.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the WPvivid Backup & Migration plugin to a patched version once available. In the absence of an official patch, administrators should restrict plugin usage to trusted personnel only and audit administrator accounts for suspicious activity. Implementing additional file upload validation at the web server or application level can help block dangerous file types. For NGINX servers, configuring strict access controls and disabling execution permissions in the upload directories can reduce risk. Monitoring file uploads and scanning for web shells or suspicious files regularly is recommended. Employing Web Application Firewalls (WAFs) with rules targeting arbitrary file uploads can provide an additional layer of defense. Organizations should also review and harden their WordPress administrator account security by enforcing strong authentication mechanisms and limiting the number of administrators. Finally, maintaining regular backups and having an incident response plan tailored for web application compromises will aid in rapid recovery if exploitation occurs.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-10T00:50:12.470Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68668b996f40f0eb72975191
Added to database: 7/3/2025, 1:54:33 PM
Last enriched: 2/27/2026, 3:47:07 PM
Last updated: 3/22/2026, 8:12:10 AM
Views: 159
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.