Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in WordPress Plugin Risks Site Security

Critical Flaw in WordPress Plugin Risks Site Security

Posted on February 12, 2026 By CWS

A significant security vulnerability has been discovered in the WPvivid Backup & Migration WordPress plugin, potentially impacting up to 800,000 websites. This flaw could allow unauthorized attackers to upload malicious files and execute code on vulnerable servers, potentially leading to complete site compromise.

Details of the Vulnerability

The vulnerability is identified as CVE-2026-1357 and has been given a critical severity score of 9.8. It affects versions of the plugin up to 0.9.123. A patch addressing this issue is available in version 0.9.124. The risk is particularly high when the plugin’s feature to receive backups from another site is activated, as this option is disabled by default and requires a key that expires within 24 hours.

Attackers can exploit the backup-receiving endpoint using the parameter wpvivid_action=send_to_site to initiate the file upload process. Wordfence researchers have highlighted that the vulnerability arises from a combination of cryptographic error handling and insecure file path management, enabling arbitrary PHP file uploads and remote code execution.

Technical Insights into the Exploit

The vulnerability is triggered when RSA decryption fails during message processing, resulting in the use of a predictable key composed of null bytes in the AES/Rijndael encryption routine. This flaw allows attackers to craft data packets that the server will accept as legitimate.

Moreover, the plugin did not properly sanitize filenames extracted from the decrypted data. This oversight permits directory traversal attacks, where files can escape the designated backup directory and be placed in publicly accessible locations on the server.

Solutions and Recommendations

WPvivid addressed the issue in version 0.9.124 by halting processing when the decrypted key is invalid and by restricting uploads to specific backup file types such as zip, gz, tar, and sql. Administrators are strongly urged to update to the latest plugin version, disable the receive-backup feature when not in use, rotate any active keys, and check their server for unexpected PHP files.

It is crucial for website administrators to promptly apply these updates and security measures to mitigate the risk of exploitation. Maintaining site security through regular updates and vigilant monitoring remains a top priority in safeguarding digital assets.

Cyber Security News Tags:CVE-2026-1357, Cybersecurity, directory traversal, plugin vulnerability, remote code execution, RSA decryption, website security, Wordfence, WordPress, WPvivid

Post navigation

Previous Post: Google Chrome Update: Critical Security Fixes Released
Next Post: NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord

Related Posts

Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors Cyber Security News
Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia Cyber Security News
Microsoft Confirms New Outlook Bug Blocking Excel Attachments Microsoft Confirms New Outlook Bug Blocking Excel Attachments Cyber Security News
Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available Cyber Security News
Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain Cyber Security News
ESET Warns AI-driven Malware Attack and Rapidly Growing Ransomware Economy ESET Warns AI-driven Malware Attack and Rapidly Growing Ransomware Economy Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices
  • 287 Chrome Extensions Breach Privacy of Millions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices
  • 287 Chrome Extensions Breach Privacy of Millions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News