Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in WordPress Plugin Risks Site Security

Critical Flaw in WordPress Plugin Risks Site Security

Posted on February 12, 2026 By CWS

A significant security vulnerability has been discovered in the WPvivid Backup & Migration WordPress plugin, potentially impacting up to 800,000 websites. This flaw could allow unauthorized attackers to upload malicious files and execute code on vulnerable servers, potentially leading to complete site compromise.

Details of the Vulnerability

The vulnerability is identified as CVE-2026-1357 and has been given a critical severity score of 9.8. It affects versions of the plugin up to 0.9.123. A patch addressing this issue is available in version 0.9.124. The risk is particularly high when the plugin’s feature to receive backups from another site is activated, as this option is disabled by default and requires a key that expires within 24 hours.

Attackers can exploit the backup-receiving endpoint using the parameter wpvivid_action=send_to_site to initiate the file upload process. Wordfence researchers have highlighted that the vulnerability arises from a combination of cryptographic error handling and insecure file path management, enabling arbitrary PHP file uploads and remote code execution.

Technical Insights into the Exploit

The vulnerability is triggered when RSA decryption fails during message processing, resulting in the use of a predictable key composed of null bytes in the AES/Rijndael encryption routine. This flaw allows attackers to craft data packets that the server will accept as legitimate.

Moreover, the plugin did not properly sanitize filenames extracted from the decrypted data. This oversight permits directory traversal attacks, where files can escape the designated backup directory and be placed in publicly accessible locations on the server.

Solutions and Recommendations

WPvivid addressed the issue in version 0.9.124 by halting processing when the decrypted key is invalid and by restricting uploads to specific backup file types such as zip, gz, tar, and sql. Administrators are strongly urged to update to the latest plugin version, disable the receive-backup feature when not in use, rotate any active keys, and check their server for unexpected PHP files.

It is crucial for website administrators to promptly apply these updates and security measures to mitigate the risk of exploitation. Maintaining site security through regular updates and vigilant monitoring remains a top priority in safeguarding digital assets.

Cyber Security News Tags:CVE-2026-1357, Cybersecurity, directory traversal, plugin vulnerability, remote code execution, RSA decryption, website security, Wordfence, WordPress, WPvivid

Post navigation

Previous Post: Google Chrome Update: Critical Security Fixes Released
Next Post: NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord

Related Posts

Water Saci Hackers Leverage WhatsApp to Deliver Multi-Vector Persistent SORVEPOTEL Malware Water Saci Hackers Leverage WhatsApp to Deliver Multi-Vector Persistent SORVEPOTEL Malware Cyber Security News
Over 644,000 Domains Exposed to Critical React Server Components Vulnerability Over 644,000 Domains Exposed to Critical React Server Components Vulnerability Cyber Security News
Hackers Uses Social Engineering Attack to Gain Remote Access in 300 Seconds Hackers Uses Social Engineering Attack to Gain Remote Access in 300 Seconds Cyber Security News
HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance HackerOne Confirms Data Breach – Hackers Gained Unauthorized Access To Salesforce Instance Cyber Security News
ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns ShinyHunters Possibly Collaborates With Scattered Spider in Salesforce Attack Campaigns Cyber Security News
LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark