Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in WordPress Plugin Risks Site Security

Critical Flaw in WordPress Plugin Risks Site Security

Posted on February 12, 2026 By CWS

A significant security vulnerability has been discovered in the WPvivid Backup & Migration WordPress plugin, potentially impacting up to 800,000 websites. This flaw could allow unauthorized attackers to upload malicious files and execute code on vulnerable servers, potentially leading to complete site compromise.

Details of the Vulnerability

The vulnerability is identified as CVE-2026-1357 and has been given a critical severity score of 9.8. It affects versions of the plugin up to 0.9.123. A patch addressing this issue is available in version 0.9.124. The risk is particularly high when the plugin’s feature to receive backups from another site is activated, as this option is disabled by default and requires a key that expires within 24 hours.

Attackers can exploit the backup-receiving endpoint using the parameter wpvivid_action=send_to_site to initiate the file upload process. Wordfence researchers have highlighted that the vulnerability arises from a combination of cryptographic error handling and insecure file path management, enabling arbitrary PHP file uploads and remote code execution.

Technical Insights into the Exploit

The vulnerability is triggered when RSA decryption fails during message processing, resulting in the use of a predictable key composed of null bytes in the AES/Rijndael encryption routine. This flaw allows attackers to craft data packets that the server will accept as legitimate.

Moreover, the plugin did not properly sanitize filenames extracted from the decrypted data. This oversight permits directory traversal attacks, where files can escape the designated backup directory and be placed in publicly accessible locations on the server.

Solutions and Recommendations

WPvivid addressed the issue in version 0.9.124 by halting processing when the decrypted key is invalid and by restricting uploads to specific backup file types such as zip, gz, tar, and sql. Administrators are strongly urged to update to the latest plugin version, disable the receive-backup feature when not in use, rotate any active keys, and check their server for unexpected PHP files.

It is crucial for website administrators to promptly apply these updates and security measures to mitigate the risk of exploitation. Maintaining site security through regular updates and vigilant monitoring remains a top priority in safeguarding digital assets.

Cyber Security News Tags:CVE-2026-1357, Cybersecurity, directory traversal, plugin vulnerability, remote code execution, RSA decryption, website security, Wordfence, WordPress, WPvivid

Post navigation

Previous Post: Google Chrome Update: Critical Security Fixes Released
Next Post: NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord

Related Posts

Poland Arrested Suspected Russian Citizen Hacking for Local Organizations Computer Networks Poland Arrested Suspected Russian Citizen Hacking for Local Organizations Computer Networks Cyber Security News
Malware Campaign Targets Crypto Pros with Fake LinkedIn VCs Malware Campaign Targets Crypto Pros with Fake LinkedIn VCs Cyber Security News
Noodlophile Malware Uses Fake Jobs to Evade Security Noodlophile Malware Uses Fake Jobs to Evade Security Cyber Security News
New Ghost-tapping Attacks Steal Customers’ Cards Linked to Services Like Apple Pay and Google Pay New Ghost-tapping Attacks Steal Customers’ Cards Linked to Services Like Apple Pay and Google Pay Cyber Security News
OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code Cyber Security News
New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash New Clever Phishing Attack Uses Japanese Character “ん” to Mimic Forward Slash Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark