Posted in

Critical WPvivid Backup Flaw Exposes 800,000 WordPress Sites

A critical vulnerability in the WPvivid Backup plugin has left over 800,000 WordPress sites exposed to unauthenticated remote code execution (RCE). Discovered via Wordfence’s Bug Bounty Program, this flaw enables attackers to upload malicious files and take full control of vulnerable websites.

For WordPress site administrators, developers, and security teams, this is a high-risk scenario. Exploitation can result in webshells, backdoors, defacement, or data theft, impacting both personal and enterprise WordPress deployments.

In this guide, you’ll learn how the vulnerability works, its technical mechanics, real-world impact, and actionable steps to protect WordPress sites.


What Is WPvivid Backup & Migration?

WPvivid Backup & Migration is a popular WordPress plugin that provides:

  • Backup and restore capabilities
  • Site migration
  • Staging and testing environments

Despite its usefulness, versions up to 0.9.123 suffer from a critical arbitrary file upload flaw, tracked as CVE-2026-1357, with a CVSS score of 9.8.

The vulnerability specifically affects sites with the receive key feature enabled, which is off by default but widely used in automated backup workflows.


How the Vulnerability Works

The flaw stems from poor error handling in RSA decryption and missing path sanitization during backup transfers.

Technical Mechanics

  1. Decryption Failure Exploit
    • The send_to_site() function decrypts POST data using a site-specific private key.
    • If openssl_private_decrypt() fails, it returns false.
    • The AES cipher interprets this as null bytes, which attackers can predict.
  2. Arbitrary File Upload
    • Filenames are not validated, allowing directory traversal into web-accessible locations.
    • Crafted payloads can be executed as PHP shells.
  3. Bypassing Authentication
    • Attackers exploit the wpvivid_action=send_to_site and wpvivid_content parameters.
    • With the receive key enabled, they can upload malicious content without authentication.

Example of Potential Impact:
An attacker could send a base64-encoded PHP payload to the server, gain shell access, and control the site entirely.


Disclosure Timeline

DateAction
Jan 12, 2026Wordfence receives report from Lucas Montes (NiRoX)
Jan 22, 2026Wordfence firewall rules deployed for premium users
Jan 23, 2026Vendor contacted
Jan 28, 2026Patch released (v0.9.124)
Feb 21, 2026Free user firewall rules applied

The responsible researcher earned $2,145 through Wordfence’s bug bounty program.


Patch and Security Fixes

WPvivid Backup v0.9.124 introduces:

  1. Decryption Safeguard if ($key === false || empty($key)) { return false; } Prevents invalid flows from proceeding.
  2. File Validation
    • Only allows extensions: zip, gz, tar, sql
    • Uses preg_replace sanitization and in_array checks

Immediate Recommendations for Site Owners:

  • Update to v0.9.124 immediately
  • Disable the receive key if unused
  • Scan for unauthorized files or webshells
  • Monitor logs for unusual upload activity

Real-World Implications

Sites left unpatched face risks including:

RiskPotential Impact
Remote Code ExecutionFull site takeover via webshells
Data TheftDatabase, user credentials, sensitive content
Website DefacementVisible content tampering
Persistent BackdoorsUndetected access for attackers

Even temporarily exposed sites can become part of botnets, phishing platforms, or malware distribution networks.


Best Practices to Prevent Backup Plugin Exploits

  1. Regularly Patch Plugins
    • Keep all WordPress plugins updated
    • Prioritize high-risk plugins with file access or server interactions
  2. Limit Backup Transfer Features
    • Only enable receive keys and remote transfers when necessary
    • Implement short expiration times for any active keys
  3. Sanitize and Validate
    • Ensure uploaded files are restricted to safe extensions
    • Validate all paths to prevent directory traversal
  4. Monitor for Suspicious Activity
    • Audit file uploads and web-accessible directories
    • Deploy Wordfence or other security plugins for behavioral monitoring
  5. Bug Bounty Awareness
    • Participate in or monitor vulnerability disclosures via Wordfence and other programs
    • Respond proactively to reported critical flaws

Expert Insight

This WPvivid vulnerability highlights a common issue in backup and migration plugins: the combination of remote transfer capabilities and poor input validation can lead to RCE.

Key takeaway:
Even trusted plugins require careful configuration, timely patching, and monitoring. Security teams must treat all file uploads as untrusted input.


FAQs: WPvivid Backup RCE Vulnerability

What versions are affected by CVE-2026-1357?

Versions up to 0.9.123 are vulnerable. Update to 0.9.124 immediately.


How do attackers exploit this vulnerability?

By sending crafted POST requests with base64-encoded payloads via the wpvivid_action=send_to_site and wpvivid_content parameters when the receive key is active.


Can sites without the receive key be affected?

No. The vulnerability requires the receive key feature to be enabled.


What are the risks of not patching?

Remote code execution, site takeover, webshells, data theft, defacement, and persistent backdoors.


How can I secure my WordPress backups?

Update plugins, restrict backup transfers, sanitize uploads, monitor for suspicious files, and apply security monitoring tools like Wordfence.


Conclusion

The WPvivid Backup RCE vulnerability serves as a critical reminder that backup and migration tools can become attack vectors if misconfigured or unpatched.

Organizations and site owners must:

  • Upgrade to v0.9.124 immediately
  • Disable unused receive keys
  • Audit existing uploads for malicious files
  • Implement strict monitoring and plugin hardening

Proactive action ensures WordPress sites remain secure against arbitrary code execution, data theft, and unauthorized server access.

Leave a Reply

Your email address will not be published. Required fields are marked *