WordPress WPvivid Backup Plugin Flaw Puts Over 800,000 Sites at Risk of Full Takeover


A critical security vulnerability in the WPvivid Backup & Migration WordPress plugin can let attackers upload files without logging in and run code on the server. This flaw is tracked as CVE-2026-1357 and has a CVSS severity score of 9.8, underlining its high risk. More than 800,000 WordPress sites using versions up to 0.9.123 may be exposed if a specific feature is enabled, according to security researchers.

A patch for this issue was released in version 0.9.124. Site owners and administrators are urged to update immediately to prevent potential site takeover by remote attackers.

What the Vulnerability Does

The flaw allows unauthenticated attackers to send specially crafted requests to a backup endpoint. Those requests can include malicious files such as PHP scripts. If accepted and stored in the publicly accessible part of the site, those files can be executed, allowing full remote code execution and total control of the site’s content and server.

According to the official vulnerability entry: “This makes it possible for unauthenticated attackers to upload arbitrary PHP files to publicly accessible directories and achieve Remote Code Execution via the wpvivid_action=send_to_site parameter.” NVD entry on CVE-2026-1357.

The risk is highest when the plugin’s “receive a backup from another site” feature is active. This option is not enabled by default, but many administrators enable it briefly during migrations or external backups, creating a window of exposure.

How the Exploit Works

Security analysts explain that a combination of two coding flaws makes the exploit possible:

  1. Improper error handling in RSA decryption
  2. Lack of path sanitization for uploaded files

When a session key fails to decrypt using openssl_private_decrypt(), the plugin did not stop execution. Instead it passed a false value into the encryption routine. That value is interpreted as a predictable null-byte string, making it easy for attackers to craft accepted payloads.

At the same time, filenames extracted from these payloads were not properly checked. This allowed an attacker to use directory traversal to place malicious files in locations outside the intended backup folder.

Who Reported It and How It Was Fixed

The issue was discovered by security researcher Lucas Montes (NiRoX) and responsibly reported to the Wordfence Bug Bounty Program on January 12, 2026. Wordfence assigned the CVE designation and tracked the vulnerability.

Wordfence released a firewall rule for premium users on January 22, 2026, to block exploit attempts. Free users of the Wordfence plugin will receive the same protection on February 21, 2026.

The WPvivid development team responded quickly and released a patched version (0.9.124) on January 28, 2026. This update adds safeguards to halt processing if RSA decryption fails and enforces strict file type checks for uploads.

Plugin Popularity and Exposure

WPvivid Backup & Migration is widely used among WordPress sites. According to Wordfence data, it has around 900,000 active installations.

Not all of these sites are necessarily vulnerable at any given time. The critical exploit path only applies when the backup key feature is enabled, creating a temporary security window. However, because site migrations and remote backups are common, this feature may be activated frequently.

Technical Summary of the Flaw

AspectDetails
CVE IDCVE-2026-1357
SeverityCVSS 9.8 (Critical)
Affected Versions≤ 0.9.123
Patched Version0.9.124
Active Installations~800,000–900,000
Exploit ConditionPlugin’s backup receive feature enabled
Attack VectorUnauthenticated arbitrary file upload
Parameterwpvivid_action=send_to_site
Root CausesRSA error mis-handling + path sanitization gap

What Site Owners Should Do Now

Update the plugin to version 0.9.124 or newer immediately.

Disable the “receive backup from another site” feature when not in use.

Rotate any generated keys that were used for backup transfers.

Scan the web root for unexpected PHP files that may have been uploaded during the exposed period.

Use a Web Application Firewall (WAF) to block suspicious requests to the vulnerable parameter.

How to Protect Your Site

Best practices for WordPress security include:

  • Keep WordPress core and all plugins up to date.
  • Avoid enabling features that allow arbitrary external access unless essential.
  • Use security plugins that detect or block unusual upload attempts.
  • Perform regular backups and store them offsite.
  • Monitor web directories for unauthorized changes.

Layered defenses reduce the risk that a single plugin flaw leads to a full site compromise.

FAQ

Q: Is every WordPress site using WPvivid vulnerable?

A: No. The critical risk applies only when the backup-receiving feature is enabled and a temporary key is active. Many sites do not use this feature regularly.

Q: What happens if a site is exploited?

A: A successful exploit lets an attacker upload and run arbitrary PHP code, which can lead to full site takeover, defacement, or data theft.

Q: Should I update right now?

A: Yes. Updating to version 0.9.124 or later removes the vulnerability and is strongly recommended.

Q: What if I cannot update immediately?

A: Temporarily disabling the plugin and applying a Web Application Firewall rule to block the vulnerable upload path can reduce risk until the patch is applied.

Q: What is the significance of the 24-hour key?

A: The key is generated when enabling remote backup reception and is valid for up to 24 hours. That period represents the window attackers can exploit the flaw if active.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages