CVE-2026-1357: CWE-434 Unrestricted Upload of File with Dangerous Type in wpvividplugins Migration, Backup, Staging – WPvivid Backup & Migration
CVE-2026-1357 is a critical unauthenticated arbitrary file upload vulnerability in the WPvivid Backup & Migration WordPress plugin (versions up to 0. 9. 123). It arises from improper error handling during RSA decryption and lack of filename sanitization, allowing attackers to upload malicious PHP files via directory traversal. Exploitation leads to remote code execution without requiring authentication or user interaction. The vulnerability has a CVSS score of 9. 8, indicating high impact on confidentiality, integrity, and availability. European organizations using this plugin on WordPress sites are at significant risk, especially those with public-facing web servers. Mitigation requires immediate plugin updates or disabling the vulnerable functionality, strict input validation, and web server hardening. Countries with high WordPress usage and significant e-commerce or public sector web presence, such as Germany, France, and the UK, are most likely affected.
AI Analysis
Technical Summary
CVE-2026-1357 affects the WPvivid Backup & Migration plugin for WordPress, specifically versions up to and including 0.9.123. The vulnerability stems from a flawed error handling mechanism during the RSA decryption process of session keys. When openssl_private_decrypt() fails, it returns false, but the plugin does not halt execution. Instead, it passes this false value to the phpseclib AES cipher initialization, which interprets it as a string of null bytes. This predictable null-byte key allows an attacker to craft an encrypted payload that the plugin will accept. Furthermore, the plugin fails to sanitize filenames extracted from the decrypted payload, enabling directory traversal attacks that allow files to be written outside the intended backup directory. By exploiting the wpvivid_action=send_to_site parameter, an unauthenticated attacker can upload arbitrary PHP files to publicly accessible directories, leading to remote code execution (RCE). This vulnerability requires no authentication or user interaction, making it highly exploitable. The CVSS v3.1 score of 9.8 reflects its critical severity, with full impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and ease of exploitation pose a severe threat to WordPress sites using this plugin.
Potential Impact
For European organizations, this vulnerability presents a critical risk. Many businesses, government agencies, and NGOs in Europe rely on WordPress for their web presence, often using plugins like WPvivid Backup & Migration for site backups and migrations. Successful exploitation can lead to complete site compromise, data theft, defacement, or use of the server as a pivot point for further attacks within the network. The ability to upload arbitrary PHP files and execute code remotely without authentication means attackers can bypass most traditional security controls. This can result in significant operational disruption, reputational damage, regulatory penalties under GDPR for data breaches, and financial losses. Public-facing web servers are particularly vulnerable, and organizations with limited patch management or security monitoring capabilities face increased risk. The vulnerability also threatens managed service providers hosting multiple client sites, potentially amplifying impact.
Mitigation Recommendations
Immediate mitigation steps include updating the WPvivid Backup & Migration plugin to a patched version once released by the vendor. Until a patch is available, organizations should consider disabling the plugin or the vulnerable functionality (especially the wpvivid_action=send_to_site parameter). Implement strict input validation and sanitization on all file uploads and parameters related to backup and migration processes. Web server configurations should restrict execution permissions in upload directories and enforce least privilege principles. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious file upload patterns and directory traversal attempts. Regularly audit WordPress installations and plugins for unauthorized files or modifications. Monitor logs for unusual activity related to the plugin's endpoints. Finally, conduct security awareness training for administrators managing WordPress environments to recognize and respond to such threats promptly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2026-1357: CWE-434 Unrestricted Upload of File with Dangerous Type in wpvividplugins Migration, Backup, Staging – WPvivid Backup & Migration
Description
CVE-2026-1357 is a critical unauthenticated arbitrary file upload vulnerability in the WPvivid Backup & Migration WordPress plugin (versions up to 0. 9. 123). It arises from improper error handling during RSA decryption and lack of filename sanitization, allowing attackers to upload malicious PHP files via directory traversal. Exploitation leads to remote code execution without requiring authentication or user interaction. The vulnerability has a CVSS score of 9. 8, indicating high impact on confidentiality, integrity, and availability. European organizations using this plugin on WordPress sites are at significant risk, especially those with public-facing web servers. Mitigation requires immediate plugin updates or disabling the vulnerable functionality, strict input validation, and web server hardening. Countries with high WordPress usage and significant e-commerce or public sector web presence, such as Germany, France, and the UK, are most likely affected.
AI-Powered Analysis
Technical Analysis
CVE-2026-1357 affects the WPvivid Backup & Migration plugin for WordPress, specifically versions up to and including 0.9.123. The vulnerability stems from a flawed error handling mechanism during the RSA decryption process of session keys. When openssl_private_decrypt() fails, it returns false, but the plugin does not halt execution. Instead, it passes this false value to the phpseclib AES cipher initialization, which interprets it as a string of null bytes. This predictable null-byte key allows an attacker to craft an encrypted payload that the plugin will accept. Furthermore, the plugin fails to sanitize filenames extracted from the decrypted payload, enabling directory traversal attacks that allow files to be written outside the intended backup directory. By exploiting the wpvivid_action=send_to_site parameter, an unauthenticated attacker can upload arbitrary PHP files to publicly accessible directories, leading to remote code execution (RCE). This vulnerability requires no authentication or user interaction, making it highly exploitable. The CVSS v3.1 score of 9.8 reflects its critical severity, with full impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's nature and ease of exploitation pose a severe threat to WordPress sites using this plugin.
Potential Impact
For European organizations, this vulnerability presents a critical risk. Many businesses, government agencies, and NGOs in Europe rely on WordPress for their web presence, often using plugins like WPvivid Backup & Migration for site backups and migrations. Successful exploitation can lead to complete site compromise, data theft, defacement, or use of the server as a pivot point for further attacks within the network. The ability to upload arbitrary PHP files and execute code remotely without authentication means attackers can bypass most traditional security controls. This can result in significant operational disruption, reputational damage, regulatory penalties under GDPR for data breaches, and financial losses. Public-facing web servers are particularly vulnerable, and organizations with limited patch management or security monitoring capabilities face increased risk. The vulnerability also threatens managed service providers hosting multiple client sites, potentially amplifying impact.
Mitigation Recommendations
Immediate mitigation steps include updating the WPvivid Backup & Migration plugin to a patched version once released by the vendor. Until a patch is available, organizations should consider disabling the plugin or the vulnerable functionality (especially the wpvivid_action=send_to_site parameter). Implement strict input validation and sanitization on all file uploads and parameters related to backup and migration processes. Web server configurations should restrict execution permissions in upload directories and enforce least privilege principles. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious file upload patterns and directory traversal attempts. Regularly audit WordPress installations and plugins for unauthorized files or modifications. Monitor logs for unusual activity related to the plugin's endpoints. Finally, conduct security awareness training for administrators managing WordPress environments to recognize and respond to such threats promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-22T20:12:20.756Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698c17a84b57a58fa177280b
Added to database: 2/11/2026, 5:46:16 AM
Last enriched: 2/11/2026, 6:00:35 AM
Last updated: 2/11/2026, 8:11:56 AM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10912: CWE-639 Authorization Bypass Through User-Controlled Key in Saastech Cleaning and Internet Services Inc. TemizlikYolda
MediumCVE-2026-1235: CWE-502 Deserialization of Untrusted Data in WP eCommerce
CriticalCVE-2025-15400: CWE-862 Missing Authorization in Pix para Woocommerce
HighCVE-2026-22153: Improper access control in Fortinet FortiOS
HighCVE-2025-52436: Execute unauthorized code or commands in Fortinet FortiSandbox
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.