First published: Wed Oct 16 2024(Updated: )
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the wpvivid_upload_import_files and wpvivid_upload_files AJAX actions that allows low-level authenticated attackers to upload zip files that can be subsequently extracted. This affects versions up to, and including 0.9.35.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPvivid Migration, Backup, Staging | <=0.9.35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36842 is considered a critical vulnerability that allows unauthorized file uploads.
To fix CVE-2020-36842, update the Wpvivid Migration, Backup, Staging plugin to the latest version above 0.9.35.
CVE-2020-36842 affects users of the Wpvivid Migration, Backup, Staging plugin for WordPress versions up to 0.9.35.
CVE-2020-36842 can enable low-level authenticated attackers to upload malicious zip files.
Yes, CVE-2020-36842 is relatively easy to exploit due to the missing capability checks in the affected plugin.