Plugin Name: Migration, Backup, Staging – WPvivid
- Software Type: Plugin
- Software Slug: wpvivid-backuprestore
- Software Status: Active
- Software Author: wpvividplugins
- Software Downloads: 5,141,419
- Active Installs: 300,000
- Last Updated: September 12, 2023
- Patched Versions: 0.9.91
- Affected Versions: <=0.9.90
- Name: WPvivid Backup Plugin <= 0.9.90 - Missing Authorization via 'start_staging' and 'get_staging_progress'
- Type: Missing Authorization
- CVE: NA
- CVSS Score: 8.3 (high)
- Publicly Published: September 12, 2023
- Researcher: NA
- Description: The WPvivid Backup Plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'start_staging' and 'get_staging_progress' functions in versions up to, and including, 0.9.90.
- Name: Migration, Backup, Staging – WPvivid <= 0.9.90 - Authenticated(Administrator+) Stored Cross-Site Scripting
- Type: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- CVE: NA
- CVSS Score: 4.4 (medium)
- Publicly Published: September 12, 2023
- Researcher: NA
- Description: The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the backup path parameter in versions up to, and including, 0.9.90.
The Migration, Backup, Staging – WPvivid plugin for WordPress has vulnerabilities in versions up to and including 0.9.90. These vulnerabilities have been patched in version 0.9.91.
The WPvivid Backup Plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'start_staging' and 'get_staging_progress' functions. This makes it possible for authenticated attackers to create new staging sites and fresh WordPress installations on the server that use arbitrary database connections under the attacker's control. This can allow full site takeover via an attacker who grants themselves administrator privileges on the new database, at which point the site they control shares a file system with the victim site.
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the backup path parameter. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Advice for Users:
- Immediate Action: Encourage users to update to version 0.9.91.
- Check for Signs of Vulnerability: Monitor server logs for unauthorized staging site creation or suspicious script injections.
- Alternate Plugins: While a patch is available, users might still consider plugins that offer similar functionality as a precaution.
- Stay Updated: Always ensure that your plugins are updated to the latest versions to avoid vulnerabilities.
The prompt response from the plugin developers to patch these vulnerabilities underscores the importance of timely updates. Users are advised to ensure that they are running version 0.9.91 or later to secure their WordPress installations.
Staying on top of WordPress plugin updates is one of the most important things you can do to keep your website secure. A recently disclosed vulnerability in a popular backup and migration plugin highlights why timely updates matter when it comes to preventing website takeovers.
The WPvivid Backup and Staging plugin, with over 300,000 active installs, was found to contain two serious security issues in versions up to and including 0.9.90. The vulnerabilities, now patched in version 0.9.91, could have allowed attackers to gain unauthorized access and make changes to your WordPress installation.
About the WPvivid Plugin
The WPvivid Backup and Staging plugin is used by over 300,000 WordPress sites to handle backups and staging environments. It is developed by WPvividplugins and has over 5 million cumulative downloads. The affected versions containing the vulnerabilities are 0.9.90 and earlier.
Details of the Vulnerabilities
There are two main vulnerabilities that were addressed in the recent update:
Missing Authorization Vulnerability: This allowed unauthorized access to data and functions due to lack of capability checking in the 'start_staging' and 'get_staging_progress' functions. Attackers could potentially create new staging sites and fresh WordPress installs to take over the site.
Stored Cross-Site Scripting Vulnerability: This allowed attackers to inject scripts into pages through the backup path parameter. When users visited a compromised page, the injected scripts would execute.
Risks and Potential Impacts
These vulnerabilities, if exploited, could have led to a full site takeover by allowing attackers to gain admin access. They could inject malicious code, steal data, and deface the site.
How to Update and Stay Secure
To protect your site, it is crucial to update to WPvivid Backup and Staging version 0.9.91 immediately. This will patch the vulnerabilities and secure your WordPress installation.
You should also monitor your site closely for any unauthorized changes and consider switching plugins if you want an alternative to WPvivid.
History of Vulnerabilities
WPvivid has had 10 previous vulnerabilities reported since March 2020, so it's clear they have some work to do in improving security. Staying updated is especially important for site owners using this plugin.
This incident highlights the importance of staying on top of security updates for your plugins. While it may not seem urgent, taking a few minutes to update can prevent your site from being compromised. For small business owners with limited time, one of the best things you can do is enable automatic updates for plugins whenever possible. Your web developer can also help keep plugins updated. Staying secure requires vigilance, but is worth the effort to protect your site.
Is it safe to continue using the WPvivid Backup and Staging plugin after the recent vulnerability disclosures?
If you have updated the WPvivid Backup and Staging plugin to version 0.9.91 or later, then it should be secure against the vulnerabilities that were disclosed on September 12, 2023. The developers have released this update specifically to patch the security holes that were found.
However, as noted in the blog post, WPvivid has had 10 previous vulnerabilities reported since March 2020. While the developers have been prompt in addressing these issues, you might consider evaluating alternative plugins if you are concerned about the historical frequency of security vulnerabilities associated with WPvivid. Always make sure to regularly update all your plugins to the latest versions to minimize security risks.
How do I update my WPvivid plugin to the latest version to secure my WordPress site?
Updating your WPvivid plugin is a straightforward process that can usually be completed within your WordPress dashboard. Navigate to 'Plugins' and locate the WPvivid Backup and Staging plugin in your installed plugins list. You should see an 'Update Now' link if an update is available. Clicking this link will automatically update the plugin to the latest version.
It's important to backup your website before performing any updates to avoid any unintended consequences. While the plugin should be compatible with the latest WordPress version, occasionally conflicts can occur with other installed plugins or themes. After updating, make sure to test your website thoroughly to ensure that everything is functioning as expected.
What are the signs that my website may have been compromised due to these vulnerabilities?
Signs of a compromised website can vary depending on the nature of the attack, but there are some general indicators to look out for. Unusual user activity, new admin accounts, and changes to website files are red flags that your site might have been compromised. You should also monitor server logs for unauthorized staging site creation or suspicious script injections, as mentioned in the blog post.
It's advisable to run a security scan using a reliable WordPress security plugin to check for vulnerabilities. Additionally, consult your hosting provider to examine server logs and other technical indicators of compromise. If you find any evidence that your site has been affected, take immediate action to remove the vulnerability and consult with cybersecurity professionals to mitigate the impact.
Can I roll back to a previous version of my website if I've been compromised?
Rolling back to a previous version of your website is possible if you have kept regular backups. This can be a lifesaver in case of a compromise, as it allows you to restore your site to a state before the vulnerability was exploited. However, simply restoring your site to a previous state without addressing the security issues leaves your website open to the same attacks.
After rolling back, it's crucial to update the WPvivid plugin to the patched version (0.9.91 or later) and to check for other potential security vulnerabilities. You may also need to change passwords and scrutinize user accounts to make sure no unauthorized accounts have been created. Consulting with cybersecurity experts can help ensure that all vulnerabilities are addressed and that your site is secure moving forward.
Are there alternative plugins that offer similar functionality without the vulnerabilities?
Yes, there are several alternative plugins that offer similar backup, migration, and staging functionalities for WordPress. Some popular options include UpdraftPlus, All-in-One WP Migration, and Duplicator. These plugins are widely used and have strong reputations for security and functionality.
However, no plugin can guarantee 100% security, as vulnerabilities can be discovered in any software. It's essential to always keep plugins updated to the latest version and regularly check for security advisories. If you do decide to switch to an alternative plugin, make sure to thoroughly read reviews and possibly consult with a web development expert to ensure that the plugin meets your specific needs and has a good track record for security.
How do I check if my current WPvivid plugin version is vulnerable?
To check the version of your installed WPvivid Backup and Staging plugin, you can go to your WordPress dashboard and navigate to 'Plugins.' The version number of each installed plugin, including WPvivid, will be listed there. If your WPvivid plugin version is 0.9.90 or earlier, it is vulnerable and needs to be updated immediately.
To stay ahead of potential issues, it's good practice to sign up for security bulletins or newsletters that focus on WordPress plugins. These sources often provide timely information on known vulnerabilities and required updates. It's also advisable to enable automatic updates for your plugins whenever possible to ensure you're always running the latest versions, which typically include patches for recently discovered vulnerabilities.
Is the patched version 0.9.91 compatible with the latest WordPress update?
The blog post does not specify whether version 0.9.91 of the WPvivid Backup and Staging plugin is compatible with the latest WordPress update. However, most plugin developers aim to maintain compatibility with the latest versions of WordPress. It's generally advisable to first update WordPress and then update your plugins to ensure maximum compatibility.
Before updating, make sure to backup your website and possibly test the new plugin version on a staging environment. This helps you catch any issues or conflicts with other plugins or themes before they affect your live website. If you encounter any problems after updating, you may need to consult the plugin's support forums or get in touch with the developers for troubleshooting assistance.
What should I do if I'm still using an affected version and can't update immediately?
If you're unable to update the WPvivid Backup and Staging plugin immediately, you are running a higher risk of encountering the vulnerabilities discussed. As a temporary measure, you may consider deactivating the plugin until you can safely update it. Deactivating the plugin will disable its functionality but should reduce the risk of exploitation.
Additionally, you should increase your website's monitoring to look for signs of unauthorized activity, such as the creation of new admin accounts, unauthorized database changes, or suspicious server logs. Inform your team or web administrator about the issue and prepare to take immediate corrective actions if you detect any signs of a security breach. Make updating the plugin your utmost priority to secure your site.
What does the CVSS score mean in relation to the disclosed vulnerabilities?
The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal characteristics of a vulnerability and produce a numerical score that reflects its severity. In this case, the first vulnerability has a CVSS score of 8.3, which is categorized as "high," indicating that it poses a significant risk. The second vulnerability has a CVSS score of 4.4, which is considered "medium," representing a moderate level of risk.
The CVSS score can be useful for prioritizing actions you should take in response to disclosed vulnerabilities. A high score usually suggests immediate action is needed, such as updating the software or implementing alternative security measures. A medium score still requires attention but may not be as urgent. However, any disclosed vulnerability should be addressed as promptly as possible to minimize risks.
How do I know if my website has already been compromised due to these vulnerabilities?
Identifying whether your website has already been compromised can be challenging without technical expertise. However, you can start by looking for unusual activity on your website. This could include unfamiliar admin accounts, changes to your website content, or unauthorized modifications to your server or database. You can also check your server logs for any suspicious activities like unauthorized staging site creations or script injections.
If you suspect that your site has been compromised, you should engage cybersecurity experts for a thorough analysis. They can perform detailed scans of your server, review logs, and assess the database to identify any signs of compromise. It's also recommended to update the WPvivid plugin to the latest patched version and consider changing all passwords associated with your website, including FTP and database credentials, as a precautionary measure.