🔐 CVE Alert

CVE-2024-13869

HIGH 7.2

Migration, Backup, Staging – WPvivid <= 0.9.112 - Authenticated (Admin+) Arbitrary File Upload via wpvivid_upload_file

CVSS Score
7.2
EPSS Score
0.0%
EPSS Percentile
0th

The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_files' function in all versions up to, and including, 0.9.112. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers.

CWE CWE-434
Vendor wpvividplugins
Product wpvivid — backup, migration & staging
Published Feb 22, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for wpvividplugins wpvivid — backup, migration & staging

Be the first to know when new high vulnerabilities affecting wpvividplugins wpvivid — backup, migration & staging are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

wpvividplugins / WPvivid — Backup, Migration & Staging
0 ≤ 0.9.112

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/0082e46d-fdbe-4ab7-bba3-0681a25d4495?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3242904/wpvivid-backuprestore github.com: https://github.com/d0n601/CVE-2024-13869 ryankozak.com: https://ryankozak.com/posts/cve-2024-13869/

Credits

Ryan Kozak