Vulnerability Description
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the wpvivid_upload_import_files and wpvivid_upload_files AJAX actions that allows low-level authenticated attackers to upload zip files that can be subsequently extracted. This affects versions up to, and including 0.9.35.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpvivid | Migration\, Backup\, Staging | <= 0.9.35 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&newPatch
- https://www.webarxsecurity.com/vulnerability-in-wpvivid-backup-plugin-can-lead-tBroken Link
- https://www.wordfence.com/threat-intel/vulnerabilities/id/de1da248-2e03-40fa-899Third Party Advisory
FAQ
What is CVE-2020-36842?
CVE-2020-36842 is a vulnerability with a CVSS score of 8.8 (HIGH). The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the wpvivid_upload_import_files and wpvivid_upload_files AJAX...
How severe is CVE-2020-36842?
CVE-2020-36842 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-36842?
Check the references section above for vendor advisories and patch information. Affected products include: Wpvivid Migration\, Backup\, Staging.