CVE-2022-2442

7.2 HIGH
Published: September 06, 2022 Modified: April 08, 2026
View on NVD

Description

The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to deserialization of untrusted input via the 'path' parameter in versions up to, and including 0.9.74. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2442
Source: security@wordfence.com
Third Party Advisory
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2442
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.2 / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

wpvivid