Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 05 Mar 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpvivid
Wpvivid wpvivid Backup \& Migration |
|
| CPEs | cpe:2.3:a:wpvivid:wpvivid_backup_\&_migration:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpvivid
Wpvivid wpvivid Backup \& Migration |
Mon, 24 Feb 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 23 Feb 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 22 Feb 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_files' function in all versions up to, and including, 0.9.112. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers. | |
| Title | Migration, Backup, Staging – WPvivid <= 0.9.112 - Authenticated (Admin+) Arbitrary File Upload via wpvivid_upload_file | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-26T17:55:01.223Z
Reserved: 2025-02-12T23:10:44.564Z
Link: CVE-2024-13869
Updated: 2025-02-24T12:52:49.036Z
Status : Analyzed
Published: 2025-02-22T13:15:10.920
Modified: 2025-03-05T21:28:15.293
Link: CVE-2024-13869
No data.
OpenCVE Enrichment
No data.