Posted in

Critical WPvivid Backup Plugin Vulnerability Exposes 800,000 WordPress Sites

A critical security flaw has been discovered in the WPvivid Backup & Migration WordPress plugin, putting approximately 800,000 websites at risk of remote code execution (RCE) and potential full site takeover.

Tracked as CVE-2026-1357 with a CVSS score of 9.8, the vulnerability affects plugin versions up to 0.9.123. The issue has been addressed in version 0.9.124, which includes critical fixes to prevent exploitation.

This article explores:

  • How the WPvivid vulnerability works
  • Attack vectors and risk factors
  • Steps site administrators should take to secure their sites

How the Vulnerability Works

The WPvivid flaw is most dangerous when the “receive a backup from another site” feature is enabled:

  • The feature generates a temporary key that allows a site to accept backups from another server
  • The key expires after 24 hours but is active during that window
  • An attacker can exploit the wpvivid_action=send_to_site upload path to send malicious files

Researchers at Wordfence identified two main causes:

  1. Crypto Error Handling Issue
    • When RSA decryption fails, the plugin continues processing with a false value
    • This predictable “all null bytes” key allows attackers to craft a payload the server will accept
  2. Unsafe File-Path Handling
    • Filenames from decrypted payloads are not properly sanitized
    • Attackers can perform directory traversal, placing PHP files outside the backup directory in web-accessible locations

This combination enables unauthenticated arbitrary file upload, effectively giving attackers remote code execution on vulnerable servers.


Risk and Impact

  • Affects 800,000 WordPress sites running vulnerable versions with the receive-backup feature enabled
  • Exploitable without authentication, meaning any attacker can target affected sites
  • Can lead to full site takeover, including database compromise, defacement, and further malware deployment

Fixes and Patch Information

WPvivid patched the vulnerability in version 0.9.124 by:

  • Stopping processing when the decrypted key is empty or false
  • Restricting uploads to expected backup extensions: .zip, .gz, .tar, .sql

Recommended Mitigation Steps

Site administrators should take the following actions immediately:

  1. Update the plugin to 0.9.124 or later
  2. Disable the receive-backup key when not in use
  3. Rotate any previously generated keys
  4. Audit the web root for unexpected PHP files created during the active key window
  5. Monitor logs for suspicious activity related to wpvivid_action uploads

Key Takeaways

  • Always keep plugins updated — critical vulnerabilities can allow unauthenticated attacks
  • Limit or disable high-risk features unless actively needed
  • Regularly audit web roots and backup directories for malicious files
  • Use a web application firewall (WAF) to block suspicious requests, especially for upload paths

The WPvivid vulnerability highlights how even widely-used backup plugins can expose WordPress sites to critical RCE risks if misconfigured or outdated. Prompt patching and proper configuration are essential to secure your site.

Leave a Reply

Your email address will not be published. Required fields are marked *