The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_files' function in all versions up to, and including, 0.9.112. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers.
References
| Link | Resource |
|---|---|
| https://github.com/d0n601/CVE-2024-13869 | Third Party Advisory Exploit |
| https://plugins.trac.wordpress.org/changeset/3242904/wpvivid-backuprestore | Patch |
| https://ryankozak.com/posts/cve-2024-13869/ | Product Exploit |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/0082e46d-fdbe-4ab7-bba3-0681a25d4495?source=cve | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-02-22 13:15
Updated : 2025-03-05 21:42
NVD link : CVE-2024-13869
Mitre link : CVE-2024-13869
CVE.ORG link : CVE-2024-13869
JSON object : View
Products Affected
wpvivid
- wpvivid_backup_\&_migration
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
