Input validation vulnerability in Migration, Backup, Staging – WPvivid 0.9.99

The WPvivid Backup & Migration Plugin for WordPress has a security vulnerability that allows attackers to execute malicious code. This vulnerability exists in all versions up to and including version 0.9.99. The issue is caused by the plugin not properly checking the input received at the wpvividstg_get_custom_exclude_path_free action. This means that attackers with admin-level access can use a technique called PHAR Deserialization to manipulate the plugin and potentially delete files, access sensitive information, or run unauthorized code. This vulnerability does not have a built-in protection mechanism and can only be exploited if the attacker has installed an additional plugin or theme on the targeted website.

Detected in:

Migration, Backup, Staging – WPvivid fixed vulnerable versions: >= * <= 0.9.99

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.