CVE-2026-1357: CWE-434 Unrestricted Upload of File with Dangerous Type in wpvividplugins Migration, Backup, Staging – WPvivid Backup & Migration
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper error handling in the RSA decryption process combined with a lack of path sanitization when writing uploaded files. When the plugin fails to decrypt a session key using openssl_private_decrypt(), it does not terminate execution and instead passes the boolean false value to the phpseclib library's AES cipher initialization. The library treats this false value as a string of null bytes, allowing an attacker to encrypt a malicious payload using a predictable null-byte key. Additionally, the plugin accepts filenames from the decrypted payload without sanitization, enabling directory traversal to escape the protected backup directory. This makes it possible for unauthenticated attackers to upload arbitrary PHP files to publicly accessible directories and achieve Remote Code Execution via the wpvivid_action=send_to_site parameter.
AI Analysis
Technical Summary
CVE-2026-1357 affects the WPvivid Backup & Migration plugin for WordPress, specifically versions up to and including 0.9.123. The vulnerability is an unauthenticated arbitrary file upload caused by a combination of improper error handling in the RSA decryption process and lack of path sanitization when handling uploaded files. When the plugin attempts to decrypt a session key using openssl_private_decrypt(), failure does not halt execution; instead, a boolean false is passed to the phpseclib AES cipher initialization. The phpseclib library interprets this false as a string of null bytes, allowing attackers to encrypt malicious payloads with a predictable null-byte key. Furthermore, the plugin accepts filenames from the decrypted payload without sanitizing them, enabling directory traversal attacks that escape the intended backup directory. This allows attackers to upload arbitrary PHP files to publicly accessible directories. Through the wpvivid_action=send_to_site parameter, attackers can trigger remote code execution (RCE) on the affected WordPress site. The vulnerability requires no authentication or user interaction, making it highly exploitable. The CVSS v3.1 score is 9.8 (critical), reflecting the ease of exploitation and severe impact on confidentiality, integrity, and availability. No patches were linked at the time of reporting, and no known exploits in the wild have been documented yet. The flaw is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type).
Potential Impact
The impact of CVE-2026-1357 is severe for organizations using the WPvivid Backup & Migration plugin. Successful exploitation allows unauthenticated attackers to upload arbitrary PHP files, leading to remote code execution on the web server. This compromises the confidentiality of sensitive data, integrity of website content and configurations, and availability of the WordPress site. Attackers can deploy backdoors, deface websites, steal data, or pivot to internal networks. Since the vulnerability requires no authentication and no user interaction, it can be exploited at scale by automated attacks, increasing risk for all affected sites. Organizations relying on this plugin for backup and migration may face service disruption, data breaches, and reputational damage. The widespread use of WordPress globally amplifies the potential impact, especially for high-profile or business-critical websites.
Mitigation Recommendations
1. Immediately update the WPvivid Backup & Migration plugin to a patched version once available from the vendor. 2. If no patch is available, temporarily disable or uninstall the plugin to prevent exploitation. 3. Implement web application firewall (WAF) rules to block requests containing the wpvivid_action=send_to_site parameter or suspicious file upload attempts. 4. Restrict file upload permissions and ensure that directories used by the plugin are not publicly accessible or executable. 5. Monitor web server logs for unusual file uploads or execution of PHP files in backup directories. 6. Harden PHP configurations to disable execution of scripts in upload or backup directories. 7. Conduct thorough security audits and penetration testing focusing on plugin vulnerabilities. 8. Educate site administrators about the risks of outdated plugins and enforce timely updates. 9. Employ intrusion detection systems to detect anomalous activity related to this vulnerability. 10. Consider isolating WordPress instances or using containerization to limit the blast radius of potential exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan, South Korea
CVE-2026-1357: CWE-434 Unrestricted Upload of File with Dangerous Type in wpvividplugins Migration, Backup, Staging – WPvivid Backup & Migration
Description
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper error handling in the RSA decryption process combined with a lack of path sanitization when writing uploaded files. When the plugin fails to decrypt a session key using openssl_private_decrypt(), it does not terminate execution and instead passes the boolean false value to the phpseclib library's AES cipher initialization. The library treats this false value as a string of null bytes, allowing an attacker to encrypt a malicious payload using a predictable null-byte key. Additionally, the plugin accepts filenames from the decrypted payload without sanitization, enabling directory traversal to escape the protected backup directory. This makes it possible for unauthenticated attackers to upload arbitrary PHP files to publicly accessible directories and achieve Remote Code Execution via the wpvivid_action=send_to_site parameter.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1357 affects the WPvivid Backup & Migration plugin for WordPress, specifically versions up to and including 0.9.123. The vulnerability is an unauthenticated arbitrary file upload caused by a combination of improper error handling in the RSA decryption process and lack of path sanitization when handling uploaded files. When the plugin attempts to decrypt a session key using openssl_private_decrypt(), failure does not halt execution; instead, a boolean false is passed to the phpseclib AES cipher initialization. The phpseclib library interprets this false as a string of null bytes, allowing attackers to encrypt malicious payloads with a predictable null-byte key. Furthermore, the plugin accepts filenames from the decrypted payload without sanitizing them, enabling directory traversal attacks that escape the intended backup directory. This allows attackers to upload arbitrary PHP files to publicly accessible directories. Through the wpvivid_action=send_to_site parameter, attackers can trigger remote code execution (RCE) on the affected WordPress site. The vulnerability requires no authentication or user interaction, making it highly exploitable. The CVSS v3.1 score is 9.8 (critical), reflecting the ease of exploitation and severe impact on confidentiality, integrity, and availability. No patches were linked at the time of reporting, and no known exploits in the wild have been documented yet. The flaw is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type).
Potential Impact
The impact of CVE-2026-1357 is severe for organizations using the WPvivid Backup & Migration plugin. Successful exploitation allows unauthenticated attackers to upload arbitrary PHP files, leading to remote code execution on the web server. This compromises the confidentiality of sensitive data, integrity of website content and configurations, and availability of the WordPress site. Attackers can deploy backdoors, deface websites, steal data, or pivot to internal networks. Since the vulnerability requires no authentication and no user interaction, it can be exploited at scale by automated attacks, increasing risk for all affected sites. Organizations relying on this plugin for backup and migration may face service disruption, data breaches, and reputational damage. The widespread use of WordPress globally amplifies the potential impact, especially for high-profile or business-critical websites.
Mitigation Recommendations
1. Immediately update the WPvivid Backup & Migration plugin to a patched version once available from the vendor. 2. If no patch is available, temporarily disable or uninstall the plugin to prevent exploitation. 3. Implement web application firewall (WAF) rules to block requests containing the wpvivid_action=send_to_site parameter or suspicious file upload attempts. 4. Restrict file upload permissions and ensure that directories used by the plugin are not publicly accessible or executable. 5. Monitor web server logs for unusual file uploads or execution of PHP files in backup directories. 6. Harden PHP configurations to disable execution of scripts in upload or backup directories. 7. Conduct thorough security audits and penetration testing focusing on plugin vulnerabilities. 8. Educate site administrators about the risks of outdated plugins and enforce timely updates. 9. Employ intrusion detection systems to detect anomalous activity related to this vulnerability. 10. Consider isolating WordPress instances or using containerization to limit the blast radius of potential exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-22T20:12:20.756Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698c17a84b57a58fa177280b
Added to database: 2/11/2026, 5:46:16 AM
Last enriched: 2/26/2026, 7:06:44 PM
Last updated: 3/28/2026, 3:38:46 AM
Views: 279
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.