
Cloud Vulnerability DB
A community-led vulnerabilities database
The Migration, Backup, Staging - WPvivid plugin for WordPress (versions up to 0.9.91) contains a Sensitive Information Exposure vulnerability identified as CVE-2023-5576. The vulnerability stems from Google Drive API secrets being stored in plaintext within publicly visible plugin source code (NVD).
The vulnerability exists due to Google Drive API secrets being stored in plaintext in the plugin's source code, specifically in the client_secrets.json file. The CVSS v3.1 base score is 9.3 (CRITICAL) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N, indicating a high severity issue with network accessibility and no privileges required for exploitation (NVD).
If exploited, this vulnerability could allow unauthenticated attackers to impersonate the WPVivid Google Drive account via the API. This becomes possible if attackers can trick a user into reauthenticating through another vulnerability or social engineering attack (NVD).
The vulnerability affects versions up to and including 0.9.91 of the WPvivid plugin. Users should update to a patched version of the plugin when available. The issue has been addressed in subsequent releases as evidenced by the patch references (Wordpress Plugin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."