Article Details
Scrape Timestamp (UTC): 2026-02-12 17:15:21.053
Original Article Text
Click to Toggle View
WordPress plugin with 900k installs vulnerable to critical RCE flaw. A critical vulnerability in the WPvivid Backup & Migration plugin for WordPress, installed on more than 900,000 websites, can be exploited to achieve remote code execution by uploading arbitrary files without authentication. The security issue is tracked as CVE-2026-1357 and received a severity score of 9.8. It impacts all versions of the plugin up to 0.9.123 and could lead to a complete website takeover. Despite the severity of the issue, researchers at WordPress security company Defiant say that only sites with the non-default “receive backup from another site” option enabled are critically impacted. Furthermore, attackers have a 24-hour exploitation window, which is the validity of the generated key required by other sites to send backup files. This requirement limits realistic exposure; however, the plugin is commonly used for site migrations and backup transfers between hosts, so website administrators are very likely to enable this feature at some point, at least temporarily. Researcher Lucas Montes (NiRoX) reported the vulnerability to Defiant on January 12. The root cause is the improper error handling in RSA decryption, combined with a lack of path sanitization. Specifically, when the ‘openssl_private_decrypt()’ function fails, the plugin does not halt execution and instead passes the failed result (false) to the AES (Rijndael) routine. The cryptographic library treats this as a string of null bytes, creating a predictable encryption key that an attacker can use to craft malicious payloads that the plugin would accept. Additionally, the plugin failed to properly sanitize uploaded file names, allowing directory traversal. This allows writing files outside the intended backup directory and uploading malicious PHP files for remote code execution. Defiant notified the vendor, WPVividPlugins, on January 22, following validation of the provided proof-of-concept exploit. A security update addressing CVE-2026-1357 was released in version 0.9.124 on January 28. The fix includes adding a check to stop execution if RSA decryption fails, adding filename sanitization, and restricting uploads to allowed backup file types only, such as ZIP, GZ, TAR, and SQL. Users of the WPvivid Backup & Migration WordPress plugin should be aware of the risks associated with the vulnerability and upgrade to version 0.9.124 as soon as possible. The future of IT infrastructure is here Modern IT infrastructure moves faster than manual workflows can handle. In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.
Daily Brief Summary
A critical flaw in the WPvivid Backup & Migration plugin, impacting over 900,000 WordPress sites, allows remote code execution via unauthorized file uploads.
Tracked as CVE-2026-1357, this vulnerability has a severity score of 9.8 and affects all plugin versions up to 0.9.123.
Only websites with the "receive backup from another site" option enabled face critical risk, though this feature is often used during site migrations.
The vulnerability stems from improper error handling in RSA decryption and lack of path sanitization, enabling attackers to upload malicious files.
Defiant researchers reported the issue on January 12, with a patch released on January 28 in version 0.9.124, addressing the root cause and enhancing security checks.
Website administrators are urged to upgrade to the latest plugin version to mitigate the risk of exploitation and ensure site security.
This incident underscores the importance of regular updates and vigilant security practices in managing WordPress plugins.