### [CVE-2024-3054](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3054) ![](https://img.shields.io/static/v1?label=Product&message=Migration%2C%20Backup%2C%20Staging%20%E2%80%93%20WPvivid&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%20Deserialization%20of%20Untrusted%20Data&color=brightgreen) ### Description WPvivid Backup & Migration Plugin for WordPress is vulnerable to PHAR Deserialization in all versions up to, and including, 0.9.99 via deserialization of untrusted input at the wpvividstg_get_custom_exclude_path_free action. This is due to the plugin not providing sufficient path validation on the tree_node[node][id] parameter. This makes it possible for authenticated attackers, with admin-level access and above, to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. ### POC #### Reference No PoCs from references. #### Github - https://github.com/20142995/nuclei-templates - https://github.com/ARPSyndicate/cve-scores