WordPress Plugin Vulnerability Report – Migration, Backup, Staging – WPvivid – Missing Authorization & Stored Cross-Site Scripting

Plugin Name: Migration, Backup, Staging – WPvivid

Key Information:

  • Software Type: Plugin
  • Software Slug: wpvivid-backuprestore
  • Software Status: Active
  • Software Author: wpvividplugins
  • Software Downloads: 5,141,419
  • Active Installs: 300,000
  • Last Updated: September 12, 2023
  • Patched Versions: 0.9.91
  • Affected Versions: <=0.9.90

First Vulnerability:

Vulnerability Details:

  • Name: WPvivid Backup Plugin <= 0.9.90 - Missing Authorization via 'start_staging' and 'get_staging_progress'
  • Type: Missing Authorization
  • CVE: NA
  • CVSS Score: 8.3 (high)
  • Publicly Published: September 12, 2023
  • Researcher: NA
  • Description: The WPvivid Backup Plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'start_staging' and 'get_staging_progress' functions in versions up to, and including, 0.9.90.

Second Vulnerability:

Vulnerability Details:

  • Name: Migration, Backup, Staging – WPvivid <= 0.9.90 - Authenticated(Administrator+) Stored Cross-Site Scripting
  • Type: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
  • CVE: NA
  • CVSS Score: 4.4 (medium)
  • Publicly Published: September 12, 2023
  • Researcher: NA
  • Description: The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the backup path parameter in versions up to, and including, 0.9.90.

Summary:

The Migration, Backup, Staging – WPvivid plugin for WordPress has vulnerabilities in versions up to and including 0.9.90. These vulnerabilities have been patched in version 0.9.91.


Detailed Overview:

First Vulnerability:

The WPvivid Backup Plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'start_staging' and 'get_staging_progress' functions. This makes it possible for authenticated attackers to create new staging sites and fresh WordPress installations on the server that use arbitrary database connections under the attacker's control. This can allow full site takeover via an attacker who grants themselves administrator privileges on the new database, at which point the site they control shares a file system with the victim site.

Second Vulnerability:

The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the backup path parameter. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.


Advice for Users:

  • Immediate Action: Encourage users to update to version 0.9.91.
  • Check for Signs of Vulnerability: Monitor server logs for unauthorized staging site creation or suspicious script injections.
  • Alternate Plugins: While a patch is available, users might still consider plugins that offer similar functionality as a precaution.
  • Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.

Conclusion:

The prompt response from the plugin developers to patch these vulnerabilities underscores the importance of timely updates. Users are advised to ensure that they are running version 0.9.91 or later to secure their WordPress installations.


References:

 

Detailed Report:

Staying on top of WordPress plugin updates is one of the most important things you can do to keep your website secure. A recently disclosed vulnerability in a popular backup and migration plugin highlights why timely updates matter when it comes to preventing website takeovers.

The WPvivid Backup and Staging plugin, with over 300,000 active installs, was found to contain two serious security issues in versions up to and including 0.9.90. The vulnerabilities, now patched in version 0.9.91, could have allowed attackers to gain unauthorized access and make changes to your WordPress installation.

About the WPvivid Plugin

The WPvivid Backup and Staging plugin is used by over 300,000 WordPress sites to handle backups and staging environments. It is developed by WPvividplugins and has over 5 million cumulative downloads. The affected versions containing the vulnerabilities are 0.9.90 and earlier.

Details of the Vulnerabilities

There are two main vulnerabilities that were addressed in the recent update:

Missing Authorization Vulnerability: This allowed unauthorized access to data and functions due to lack of capability checking in the 'start_staging' and 'get_staging_progress' functions. Attackers could potentially create new staging sites and fresh WordPress installs to take over the site.

Stored Cross-Site Scripting Vulnerability: This allowed attackers to inject scripts into pages through the backup path parameter. When users visited a compromised page, the injected scripts would execute.

Risks and Potential Impacts

These vulnerabilities, if exploited, could have led to a full site takeover by allowing attackers to gain admin access. They could inject malicious code, steal data, and deface the site.

How to Update and Stay Secure

To protect your site, it is crucial to update to WPvivid Backup and Staging version 0.9.91 immediately. This will patch the vulnerabilities and secure your WordPress installation.

You should also monitor your site closely for any unauthorized changes and consider switching plugins if you want an alternative to WPvivid.

History of Vulnerabilities

WPvivid has had 10 previous vulnerabilities reported since March 2020, so it's clear they have some work to do in improving security. Staying updated is especially important for site owners using this plugin.

Conclusion

This incident highlights the importance of staying on top of security updates for your plugins. While it may not seem urgent, taking a few minutes to update can prevent your site from being compromised. For small business owners with limited time, one of the best things you can do is enable automatic updates for plugins whenever possible. Your web developer can also help keep plugins updated. Staying secure requires vigilance, but is worth the effort to protect your site.

Security vulnerabilities like this one demonstrate the importance of having WordPress experts regularly monitor, maintain and update your site. At Your WP Guy, we offer ongoing management to handle updates, security monitoring, backups, uptime and support so you can stop worrying and get back to growing your business.

Let us fully audit your site to check for any signs of this vulnerability or other issues. We'll immediately update any out-of-date plugins and harden your site's security. Chat with us anytime during business hours, schedule a call or call 678-995-5169 to lock down your online presence.

WordPress Plugin Vulnerability Report – Migration, Backup, Staging – WPvivid – Missing Authorization & Stored Cross-Site Scripting FAQs

Leave a Comment