# WPvivid Backup & Migration 任意文件上传漏洞
## 漏洞概述
WPvivid Backup & Migration插件由于文件类型验证缺失,允许经过身份验证的攻击者上传任意文件,这可能导致远程代码执行。
## 影响版本
所有版本至0.9.116(含)。
## 漏洞细节
在`wpvivid_upload_import_files`函数中,文件类型验证缺失,导致攻击者能够上传任意文件。这些上传的文件仅在使用NGINX作为Web服务器的WordPress实例中可访问,因为目标文件上传文件夹中的`.htaccess`文件会阻止Apache服务器上的访问。
## �.getOutputStream();受害者影响
1. **任意文件上传**:攻击者可以上传任意类型的文件。
2. **远程代码执行**:上传的文件可能被利用来执行远程代码。
3. **受限访问**:只有在使用NGINX服务器的WordPress实例中,上传的文件才可被访问。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Migration, Backup, Staging – WPvivid Backup & Migration <= 0.9.116 - Authenticated (Administrator+) Arbitrary File Upload | https://github.com/d0n601/CVE-2025-5961 | POC详情 |
2 | Migration, Backup, Staging – WPvivid Backup & Migration <= 0.9.116 - Authenticated (Administrator+) Arbitrary File Upload | https://github.com/Nxploited/CVE-2025-5961 | POC详情 |
3 | The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpvivid_upload_import_files' function in all versions up to, and including, 0.9.116. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-5961.yaml | POC详情 |
标题: Migration, Backup, Staging – WPvivid Backup & Migration <= 0.9.116 - Authenticated (Administrator+) Arbitrary File Upload -- 🔗来源链接
标签:
神龙速读标题: class-wpvivid-export-import.php in wpvivid-backuprestore/trunk/includes – WordPress Plugin Repository -- 🔗来源链接
标签:
标题: class-wpvivid-export-import.php in wpvivid-backuprestore/trunk/includes – WordPress Plugin Repository -- 🔗来源链接
标签:
标题: class-wpvivid-export-import.php in wpvivid-backuprestore/trunk/includes – WordPress Plugin Repository -- 🔗来源链接
标签:
标题: GitHub - d0n601/CVE-2025-5961: Migration, Backup, Staging – WPvivid Backup & Migration <= 0.9.116 - Authenticated (Administrator+) Arbitrary File Upload -- 🔗来源链接
标签:
神龙速读标题: Ryan Kozak - Migration, Backup, Staging – WPvivid Backup & Migration <= 0.9.116 - Authenticated (Administrator+) Arbitrary File Upload -- 🔗来源链接
标签:
神龙速读暂无评论