Close Menu
    Latest Post

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 2026

    Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling

    February 22, 2026

    How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic

    February 21, 2026
    Facebook X (Twitter) Instagram
    Trending
    • Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations
    • Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling
    • How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic
    • Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry
    • How to Cancel Your Google Pixel Watch Fitbit Premium Trial
    • GHD Speed Hair Dryer Review: Powerful Performance and User-Friendly Design
    • An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years
    • The Next Next Job, a framework for making big career decisions
    Facebook X (Twitter) Instagram Pinterest Vimeo
    NodeTodayNodeToday
    • Home
    • AI
    • Dev
    • Guides
    • Products
    • Security
    • Startups
    • Tech
    • Tools
    NodeTodayNodeToday
    Home»Security»Critical RCE Flaw Discovered in Popular WordPress Plugin with 900,000 Installs
    Security

    Critical RCE Flaw Discovered in Popular WordPress Plugin with 900,000 Installs

    Samuel AlejandroBy Samuel AlejandroFebruary 14, 2026No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    src 1ymigyy featured
    Share
    Facebook Twitter LinkedIn Pinterest Email

    WordPress plugin with 900k installs vulnerable to critical RCE flaw

    A critical vulnerability has been discovered in the WPvivid Backup & Migration plugin for WordPress, which is actively used on over 900,000 websites. This flaw enables remote code execution through the unauthorized upload of arbitrary files, bypassing authentication requirements.

    Identified as CVE-2026-1357, this security issue carries a severe rating of 9.8. It affects all plugin versions up to 0.9.123 and could potentially result in a full compromise of a website.

    Despite its critical nature, security researchers at Defiant, a WordPress security firm, note that only websites with the non-default “receive backup from another site” option enabled are at significant risk.

    Attackers have a limited 24-hour window for exploitation, corresponding to the validity period of the key generated for receiving backup files from other sites.

    While this requirement restricts the immediate exposure, the plugin is frequently utilized for website migrations and backup transfers between hosting providers. This means site administrators are likely to activate this feature, even if only for a short period.

    The vulnerability was reported to Defiant by researcher Lucas Montes (NiRoX) on January 12. Its core lies in inadequate error handling during RSA decryption and insufficient path sanitization.

    When the ‘openssl_private_decrypt()‘ function encounters a failure, the plugin continues execution rather than stopping. It then passes the failed result (false) to the AES (Rijndael) routine.

    This action causes the cryptographic library to interpret the result as a string of null bytes, leading to a predictable encryption key. An attacker could then leverage this key to create malicious payloads that the plugin would process.

    Furthermore, the plugin did not adequately sanitize uploaded file names, which enables directory traversal. This flaw permits files to be written outside the designated backup directory, including the upload of malicious PHP files for remote code execution.

    Defiant informed the vendor, WPVividPlugins, on January 22, after confirming the proof-of-concept exploit. A security update, version 0.9.124, was released on January 28 to address CVE-2026-1357.

    The patch introduces a check to halt execution if RSA decryption fails, implements filename sanitization, and limits uploads strictly to approved backup file types, including ZIP, GZ, TAR, and SQL.

    Users of the WPvivid Backup & Migration WordPress plugin are advised to be aware of the risks posed by this vulnerability and to upgrade to version 0.9.124 without delay.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticlegRPC: Understanding the Journey from Service Definition to Wire Format
    Next Article Philips Fidelio FT1: An Affordable Turntable and CD Player with Modern Connectivity
    Samuel Alejandro

    Related Posts

    Security

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 2026
    Tools

    How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic

    February 21, 2026
    Security

    An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years

    February 21, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Post

    ChatGPT Mobile App Surpasses $3 Billion in Consumer Spending

    December 21, 202513 Views

    Creator Tayla Cannon Lands $1.1M Investment for Rebuildr PT Software

    December 21, 202511 Views

    Automate Your iPhone’s Always-On Display for Better Battery Life and Privacy

    December 21, 202510 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    About

    Welcome to NodeToday, your trusted source for the latest updates in Technology, Artificial Intelligence, and Innovation. We are dedicated to delivering accurate, timely, and insightful content that helps readers stay ahead in a fast-evolving digital world.

    At NodeToday, we cover everything from AI breakthroughs and emerging technologies to product launches, software tools, developer news, and practical guides. Our goal is to simplify complex topics and present them in a clear, engaging, and easy-to-understand way for tech enthusiasts, professionals, and beginners alike.

    Latest Post

    Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations

    February 22, 20260 Views

    Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling

    February 22, 20260 Views

    How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic

    February 21, 20260 Views
    Recent Posts
    • Suspected Russian Actor Linked to CANFAIL Malware Attacks on Ukrainian Organizations
    • Trump Reinstates De Minimis Exemption Suspension Despite Supreme Court Ruling
    • How Cloudflare Mitigated a Vulnerability in its ACME Validation Logic
    • Demis Hassabis and John Jumper Receive Nobel Prize in Chemistry
    • How to Cancel Your Google Pixel Watch Fitbit Premium Trial
    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    • Cookie Policy
    © 2026 NodeToday.

    Type above and press Enter to search. Press Esc to cancel.