Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaw in WordPress Plugin Risks Site Security

Critical Flaw in WordPress Plugin Risks Site Security

Posted on February 12, 2026 By CWS

A significant security vulnerability has been discovered in the WPvivid Backup & Migration WordPress plugin, potentially impacting up to 800,000 websites. This flaw could allow unauthorized attackers to upload malicious files and execute code on vulnerable servers, potentially leading to complete site compromise.

Details of the Vulnerability

The vulnerability is identified as CVE-2026-1357 and has been given a critical severity score of 9.8. It affects versions of the plugin up to 0.9.123. A patch addressing this issue is available in version 0.9.124. The risk is particularly high when the plugin’s feature to receive backups from another site is activated, as this option is disabled by default and requires a key that expires within 24 hours.

Attackers can exploit the backup-receiving endpoint using the parameter wpvivid_action=send_to_site to initiate the file upload process. Wordfence researchers have highlighted that the vulnerability arises from a combination of cryptographic error handling and insecure file path management, enabling arbitrary PHP file uploads and remote code execution.

Technical Insights into the Exploit

The vulnerability is triggered when RSA decryption fails during message processing, resulting in the use of a predictable key composed of null bytes in the AES/Rijndael encryption routine. This flaw allows attackers to craft data packets that the server will accept as legitimate.

Moreover, the plugin did not properly sanitize filenames extracted from the decrypted data. This oversight permits directory traversal attacks, where files can escape the designated backup directory and be placed in publicly accessible locations on the server.

Solutions and Recommendations

WPvivid addressed the issue in version 0.9.124 by halting processing when the decrypted key is invalid and by restricting uploads to specific backup file types such as zip, gz, tar, and sql. Administrators are strongly urged to update to the latest plugin version, disable the receive-backup feature when not in use, rotate any active keys, and check their server for unexpected PHP files.

It is crucial for website administrators to promptly apply these updates and security measures to mitigate the risk of exploitation. Maintaining site security through regular updates and vigilant monitoring remains a top priority in safeguarding digital assets.

Cyber Security News Tags:CVE-2026-1357, Cybersecurity, directory traversal, plugin vulnerability, remote code execution, RSA decryption, website security, Wordfence, WordPress, WPvivid

Post navigation

Previous Post: Google Chrome Update: Critical Security Fixes Released
Next Post: NPM’s ‘duer-js’ Package Spreads Malware to Windows & Discord

Related Posts

UAC-0247 Targeting Ukrainian Hospitals and Governments UAC-0247 Targeting Ukrainian Hospitals and Governments Cyber Security News
Microsoft Teams New Premium Feature Blocks Screenshots and Recordings During Meeting Microsoft Teams New Premium Feature Blocks Screenshots and Recordings During Meeting Cyber Security News
Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys Cyber Security News
Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads Mocha Manakin Using Paste and Run Technique to Trick Users Into Downloading Malicious Payloads Cyber Security News
CRESCENTHARVEST Malware Targets Iran Protesters CRESCENTHARVEST Malware Targets Iran Protesters Cyber Security News
Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark