Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| wpvividplugins | Migration, Backup, Staging – WPvivid Backup & Migration | * ~ 0.9.123 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit CVE-2026-1357 | https://github.com/itsismarcos/Exploit-CVE-2026-1357 | POC Details |
| 2 | POC-CVE-2026-1357 | https://github.com/LucasM0ntes/POC-CVE-2026-1357 | POC Details |
| 3 | CVE-2026-1357 — WPvivid Backup & Migration ≤ 0.9.123 Unauthenticated RCE PoC (Cryptographic Fail-Open + Path Traversal) | https://github.com/halilkirazkaya/CVE-2026-1357 | POC Details |
| 4 | None | https://github.com/cybertechajju/CVE-2026-1357-POC | POC Details |
| 5 | WPvivid Backup & Migration plugin for WordPress <= 0.9.123 contains an unauthenticated arbitrary file upload vulnerability caused by improper error handling in RSA decryption and lack of path sanitization, letting unauthenticated attackers upload arbitrary PHP files and achieve remote code execution via wpvivid_action=send_to_site parameter. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-1357.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet