Skip to main content

CVE-2023-6925: CWE-434 Unrestricted Upload of File with Dangerous Type in unitecms Unlimited Addons for WPBakery Page Builder

High
VulnerabilityCVE-2023-6925cvecve-2023-6925cwe-434
Published: Mon Feb 05 2024 (02/05/2024, 21:21:55 UTC)
Source: CVE
Vendor/Project: unitecms
Product: Unlimited Addons for WPBakery Page Builder

Description

The Unlimited Addons for WPBakery Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'importZipFile' function in versions up to, and including, 1.0.42. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin (the default is editor role, but access can also be granted to contributor role), to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 07/04/2025, 18:42:39 UTC

Technical Analysis

CVE-2023-6925 is a high-severity vulnerability affecting the Unlimited Addons for WPBakery Page Builder plugin for WordPress, specifically versions up to and including 1.0.42. The vulnerability arises from insufficient validation of file types in the 'importZipFile' function, which allows authenticated users with certain roles (by default editor, but also contributor if granted access) to upload arbitrary files to the server hosting the WordPress site. This unrestricted file upload vulnerability (CWE-434) can be exploited to upload malicious files, potentially leading to remote code execution (RCE) on the affected server. The vulnerability requires that the attacker has an authenticated account with elevated privileges (at least editor role with plugin access), but does not require user interaction beyond authentication. The CVSS v3.1 base score is 7.2, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the vulnerability poses a significant risk due to the common use of WPBakery Page Builder and its addons in WordPress sites, which are widely deployed across many industries and regions. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability can lead to severe consequences including unauthorized access to sensitive data, website defacement, service disruption, and full server compromise through remote code execution. Organizations relying on WordPress sites with the Unlimited Addons for WPBakery Page Builder plugin are at risk of attackers leveraging compromised editor or contributor accounts to upload web shells or other malicious payloads. This can result in data breaches affecting personal data protected under GDPR, reputational damage, and potential regulatory penalties. The impact is particularly critical for sectors with high web presence such as e-commerce, media, government, and education. Additionally, compromised websites can be used as launchpads for further attacks within corporate networks or for distributing malware to visitors, amplifying the threat landscape for European entities.

Mitigation Recommendations

1. Immediately audit user roles and permissions on WordPress sites to ensure that only trusted users have editor or contributor roles with access to the Unlimited Addons plugin. 2. Restrict plugin access strictly to necessary users and consider temporarily disabling the plugin if possible until a patch is available. 3. Implement web application firewalls (WAF) with rules to detect and block suspicious file upload attempts, especially targeting ZIP or archive uploads. 4. Monitor server and application logs for unusual file upload activity or unexpected file types in upload directories. 5. Employ file integrity monitoring to detect unauthorized changes or additions to web directories. 6. Keep WordPress core, themes, and all plugins up to date and subscribe to vendor security advisories for timely patch releases. 7. Consider deploying security plugins that enforce strict file upload validation and sandboxing. 8. Conduct regular security awareness training for users with elevated roles to prevent credential compromise. 9. If feasible, isolate WordPress instances in segmented network zones to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2023-12-18T15:29:33.654Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec32e

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 6:42:39 PM

Last updated: 8/15/2025, 11:31:04 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats