Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 05 Mar 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpvivid
Wpvivid wpvivid Backup \& Migration |
|
CPEs | cpe:2.3:a:wpvivid:wpvivid_backup_\&_migration:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Wpvivid
Wpvivid wpvivid Backup \& Migration |
Mon, 24 Feb 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 23 Feb 2025 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sat, 22 Feb 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_files' function in all versions up to, and including, 0.9.112. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers. | |
Title | Migration, Backup, Staging – WPvivid <= 0.9.112 - Authenticated (Admin+) Arbitrary File Upload via wpvivid_upload_file | |
Weaknesses | CWE-434 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-26T17:55:01.223Z
Reserved: 2025-02-12T23:10:44.564Z
Link: CVE-2024-13869

Updated: 2025-02-24T12:52:49.036Z

Status : Analyzed
Published: 2025-02-22T13:15:10.920
Modified: 2025-03-05T21:28:15.293
Link: CVE-2024-13869

No data.

No data.