Description
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary directory creation in all versions up to, and including, 0.9.120. This is due to the check_filesystem_permissions() function not properly restricting the directories that can be created, or in what location. This makes it possible for authenticated attackers, with Administrator-level access and above, to create arbitrary directories.
Published: 2025-12-21
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Directory Creation via authenticated Administrator-level access
Action: Apply Update
AI Analysis

Impact

The WPvivid Backup & Migration plugin up to version 0.9.120 contains code that improperly validates the location and permissions for directory creation. This flaw allows an authenticated user with Administrator or higher privileges to create directories in arbitrary locations on the WordPress file system. The creation of directories can be a stepping stone to further malicious activity, such as uploading executable files, but the CVE description does not detail any subsequent exploitation.

Affected Systems

WordPress sites running the WPvivid plugin (Backup, Migration & Staging) under any administrator or super‑user account, including all releases through and including 0.9.120.

Risk and Exploitability

The CVSS score of 2.7 reflects a low severity, and the EPSS score of less than 1 percent indicates a very small probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access with Administrator privileges, typically achieved through a legitimate admin session or compromise of such credentials. Once accessed, the attacker can create directories at will within the allowed file system paths. No public exploit code is documented, and the attack vector is local to the WordPress admin interface.

Generated by OpenCVE AI on April 21, 2026 at 16:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WPvivid plugin to a version that resolves the directory-creation check, such as 0.9.121 or newer.
  • If the plugin is no longer required, uninstall or disable it to eliminate the attack surface.
  • Ensure only trusted administrators retain access to the plugin’s staging and backup functions, and consider tightening role permissions or removing the Staging feature if it is unnecessary for your environment.

Generated by OpenCVE AI on April 21, 2026 at 16:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpvividplugins
Wpvividplugins migration Backup Staging Wpvivd Backup And Migration
Vendors & Products Wordpress
Wordpress wordpress
Wpvividplugins
Wpvividplugins migration Backup Staging Wpvivd Backup And Migration

Mon, 22 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 21 Dec 2025 04:00:00 +0000

Type Values Removed Values Added
Description The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary directory creation in all versions up to, and including, 0.9.120. This is due to the check_filesystem_permissions() function not properly restricting the directories that can be created, or in what location. This makes it possible for authenticated attackers, with Administrator-level access and above, to create arbitrary directories.
Title Migration, Backup, Staging – WPvivid Backup & Migration <= 0.9.120 - Authenticated (Admin+) Arbitrary Directory Creation
Weaknesses CWE-73
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
Wpvividplugins Migration Backup Staging Wpvivd Backup And Migration
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:57:56.783Z

Reserved: 2025-11-03T20:38:20.329Z

Link: CVE-2025-12654

cve-icon Vulnrichment

Updated: 2025-12-22T15:52:20.318Z

cve-icon NVD

Status : Deferred

Published: 2025-12-21T04:16:04.023

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12654

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:00:12Z

Weaknesses