Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 05 Mar 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpvivid
Wpvivid wpvivid Backup \& Migration |
|
| CPEs | cpe:2.3:a:wpvivid:wpvivid_backup_\&_migration:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpvivid
Wpvivid wpvivid Backup \& Migration |
Mon, 24 Feb 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 23 Feb 2025 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 22 Feb 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload_files' function in all versions up to, and including, 0.9.112. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents access on Apache servers. | |
| Title | Migration, Backup, Staging – WPvivid <= 0.9.112 - Authenticated (Admin+) Arbitrary File Upload via wpvivid_upload_file | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:32:20.119Z
Reserved: 2025-02-12T23:10:44.564Z
Link: CVE-2024-13869
Updated: 2025-02-24T12:52:49.036Z
Status : Analyzed
Published: 2025-02-22T13:15:10.920
Modified: 2025-03-05T21:28:15.293
Link: CVE-2024-13869
No data.
OpenCVE Enrichment
No data.