Critical vulnerability in WPvivid backup plugin allows remote code execution
Overview
A serious vulnerability has been identified in the WPvivid backup plugin, tracked as CVE-2026-1357, which has a high severity score of 9.8. This issue affects all versions of the plugin up to version 0.9.123, leaving many WordPress sites potentially at risk. The flaw allows attackers to execute remote code, which could lead to unauthorized access or control over affected systems. Users of the plugin are strongly advised to take immediate action to protect their sites. This vulnerability poses a significant threat, especially for those who have not updated their plugins recently.
Key Takeaways
- Affected Systems: WPvivid backup plugin, all versions up to 0.9.123
- Action Required: Users should update the WPvivid backup plugin to the latest version to mitigate this vulnerability.
- Timeline: Newly disclosed
Original Article Summary
The vulnerability, tracked as CVE-2026-1357 with a severity score of 9.8, impacts all versions of the plugin up to 0.9.123.
Impact
WPvivid backup plugin, all versions up to 0.9.123
Exploitation Status
The exploitation status is currently unknown. Monitor vendor advisories and security bulletins for updates.
Timeline
Newly disclosed
Remediation
Users should update the WPvivid backup plugin to the latest version to mitigate this vulnerability.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to CVE, Vulnerability, Critical.