Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1357: CWE-434 Unrestricted Upload of File with Dangerous Type in wpvividplugins Migration, Backup, Staging – WPvivid Backup & Migration

0
Critical
VulnerabilityCVE-2026-1357cvecve-2026-1357cwe-434
Published: Wed Feb 11 2026 (02/11/2026, 05:30:11 UTC)
Source: CVE Database V5
Vendor/Project: wpvividplugins
Product: Migration, Backup, Staging – WPvivid Backup & Migration

Description

The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper error handling in the RSA decryption process combined with a lack of path sanitization when writing uploaded files. When the plugin fails to decrypt a session key using openssl_private_decrypt(), it does not terminate execution and instead passes the boolean false value to the phpseclib library's AES cipher initialization. The library treats this false value as a string of null bytes, allowing an attacker to encrypt a malicious payload using a predictable null-byte key. Additionally, the plugin accepts filenames from the decrypted payload without sanitization, enabling directory traversal to escape the protected backup directory. This makes it possible for unauthenticated attackers to upload arbitrary PHP files to publicly accessible directories and achieve Remote Code Execution via the wpvivid_action=send_to_site parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 19:06:44 UTC

Technical Analysis

CVE-2026-1357 affects the WPvivid Backup & Migration plugin for WordPress, specifically versions up to and including 0.9.123. The vulnerability is an unauthenticated arbitrary file upload caused by a combination of improper error handling in the RSA decryption process and lack of path sanitization when handling uploaded files. When the plugin attempts to decrypt a session key using openssl_private_decrypt(), failure does not halt execution; instead, a boolean false is passed to the phpseclib AES cipher initialization. The phpseclib library interprets this false as a string of null bytes, allowing attackers to encrypt malicious payloads with a predictable null-byte key. Furthermore, the plugin accepts filenames from the decrypted payload without sanitizing them, enabling directory traversal attacks that escape the intended backup directory. This allows attackers to upload arbitrary PHP files to publicly accessible directories. Through the wpvivid_action=send_to_site parameter, attackers can trigger remote code execution (RCE) on the affected WordPress site. The vulnerability requires no authentication or user interaction, making it highly exploitable. The CVSS v3.1 score is 9.8 (critical), reflecting the ease of exploitation and severe impact on confidentiality, integrity, and availability. No patches were linked at the time of reporting, and no known exploits in the wild have been documented yet. The flaw is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type).

Potential Impact

The impact of CVE-2026-1357 is severe for organizations using the WPvivid Backup & Migration plugin. Successful exploitation allows unauthenticated attackers to upload arbitrary PHP files, leading to remote code execution on the web server. This compromises the confidentiality of sensitive data, integrity of website content and configurations, and availability of the WordPress site. Attackers can deploy backdoors, deface websites, steal data, or pivot to internal networks. Since the vulnerability requires no authentication and no user interaction, it can be exploited at scale by automated attacks, increasing risk for all affected sites. Organizations relying on this plugin for backup and migration may face service disruption, data breaches, and reputational damage. The widespread use of WordPress globally amplifies the potential impact, especially for high-profile or business-critical websites.

Mitigation Recommendations

1. Immediately update the WPvivid Backup & Migration plugin to a patched version once available from the vendor. 2. If no patch is available, temporarily disable or uninstall the plugin to prevent exploitation. 3. Implement web application firewall (WAF) rules to block requests containing the wpvivid_action=send_to_site parameter or suspicious file upload attempts. 4. Restrict file upload permissions and ensure that directories used by the plugin are not publicly accessible or executable. 5. Monitor web server logs for unusual file uploads or execution of PHP files in backup directories. 6. Harden PHP configurations to disable execution of scripts in upload or backup directories. 7. Conduct thorough security audits and penetration testing focusing on plugin vulnerabilities. 8. Educate site administrators about the risks of outdated plugins and enforce timely updates. 9. Employ intrusion detection systems to detect anomalous activity related to this vulnerability. 10. Consider isolating WordPress instances or using containerization to limit the blast radius of potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-22T20:12:20.756Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c17a84b57a58fa177280b

Added to database: 2/11/2026, 5:46:16 AM

Last enriched: 2/26/2026, 7:06:44 PM

Last updated: 3/28/2026, 3:38:46 AM

Views: 279

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses