First published: Sat Feb 22 2025(Updated: )
The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_files' function in all versions up to, and including, 0.9.112. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPvivid Backup & Migration Plugin | <=0.9.112 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13869 is considered a high-severity vulnerability due to its potential for arbitrary file uploads.
To fix CVE-2024-13869, upgrade the WPvivid Backup & Migration plugin to version 0.9.113 or later.
CVE-2024-13869 allows authenticated attackers to upload arbitrary files, which may lead to a full compromise of the affected system.
CVE-2024-13869 affects all versions of the WPvivid Backup & Migration plugin up to and including version 0.9.112.
Any WordPress user utilizing the WPvivid Backup & Migration plugin versions 0.9.112 or earlier is vulnerable to CVE-2024-13869.