The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.9.107 via deserialization of untrusted input in the 'replace_row_data' and 'replace_serialize_data' functions. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must create a staging site to trigger the exploit.
History

Thu, 14 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Wpvividplugins
Wpvividplugins migration Backup Staging Wpvivd Backup And Migration
CPEs cpe:2.3:a:wpvividplugins:migration_backup_staging_wpvivd_backup_and_migration:*:*:*:*:*:*:*:*
Vendors & Products Wpvividplugins
Wpvividplugins migration Backup Staging Wpvivd Backup And Migration
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 Nov 2024 14:00:00 +0000

Type Values Removed Values Added
Description The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.9.107 via deserialization of untrusted input in the 'replace_row_data' and 'replace_serialize_data' functions. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must create a staging site to trigger the exploit.
Title Migration, Backup, Staging – WPvivid <= 0.9.107 - Unauthenticated PHP Object Injection
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-11-14T13:54:09.585Z

Updated: 2024-11-14T14:22:13.973Z

Reserved: 2024-11-07T01:20:07.656Z

Link: CVE-2024-10962

cve-icon Vulnrichment

Updated: 2024-11-14T14:22:05.739Z

cve-icon NVD

Status : Received

Published: 2024-11-14T14:15:17.533

Modified: 2024-11-14T14:15:17.533

Link: CVE-2024-10962

cve-icon Redhat

No data.