Wordpress Vulnerability (CVE-2026-1357) [PoC]
CVE-2026-1357
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper...
Overview
A critical security vulnerability has been identified in the popular WPvivid Backup & Migration plugin for WordPress. This flaw allows an attacker without any login credentials to upload malicious files directly to a vulnerable website, potentially leading to a complete site takeover.
Vulnerability Explained
In simple terms, the plugin contains two key failures in its file upload process. First, when it encounters an error during a specific decryption step, it does not stop the upload. Instead, it incorrectly uses a predictable, all-zero encryption key, allowing an attacker to easily craft a malicious file that the plugin will accept. Second, the plugin does not properly validate file paths, enabling an attacker to place the uploaded file outside of the intended secure backup folder and into a publicly accessible directory on the web server.
By exploiting these flaws together through a specific action (wpvivid_action=send_to_site), an unauthenticated individual can upload a PHP file containing arbitrary code.
Potential Impact
The impact of this vulnerability is severe (CVSS Score: 9.8/10, CRITICAL). A successful attack can result in:
- Remote Code Execution (RCE): Attackers can run any code they choose on your web server.
- Complete Website Compromise: This can lead to data theft, defacement, installation of backdoors, or use of your site for malicious activities like phishing or malware distribution.
- Server Compromise: An attacker may leverage access to your website to attack other sites on the same server or your internal network.
Remediation and Mitigation
Immediate action is required to protect your WordPress site.
Primary Solution – Update Immediately: The plugin developers have released a fix. Update the “Migration, Backup, Staging – WPvivid Backup & Migration” plugin to version 0.9.124 or higher immediately. This is the only complete remedy.
Immediate Mitigation (If Update is Not Instantly Possible):
- Deactivate the Plugin: If you cannot update right away, deactivate the WPvivid plugin via your WordPress admin dashboard until you can apply the patch.
- Check for Compromise: Review your site’s files, especially in
wp-content/uploads/and root directories, for any recently added suspicious PHP files. Monitor for unknown admin users or unexpected behavior. - General Security Hygiene: Ensure all other plugins, themes, and WordPress core are updated. Implement a web application firewall (WAF) rule if available to block requests containing
wpvivid_action=send_to_site.
All users of WPvivid Backup & Migration version 0.9.123 and below should treat this vulnerability as an urgent priority.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Public PoC References
Unverified third-party code
These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).
Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.
| Repository | Stars |
|---|---|
| LucasM0ntes/POC-CVE-2026-1357 POC-CVE-2026-1357 | ★ 12 |
| halilkirazkaya/CVE-2026-1357 CVE-2026-1357 — WPvivid Backup & Migration ≤ 0.9.123 Unauthenticated RCE Exploit | ★ 10 |
| cybertechajju/CVE-2026-1357-POC | ★ 9 |
| itsismarcos/Exploit-CVE-2026-1357 Exploit CVE-2026-1357 | ★ 1 |
| Nxploited/CVE-2026-1357 Migration, Backup, Staging <= 0.9.123 - Unauthenticated Arbitrary File Upload | ★ 1 |
Showing 5 of 5 known references. Source: nomi-sec/PoC-in-GitHub.
Related Advisories
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' ...
The Slider Future plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'slider_future_handle_image_upload' function in all versions up to, and includ...
The midi-Synth plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type and file extension validation in the 'export' AJAX action in all versions up to, and including, 1.1...
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input ...
Other WordPress Vulnerabilities
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' ...
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input ...
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient...
The WP Mail Logging plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.15.0 via deserialization of untrusted input from the email log message field. Thi...