CVE-2023-6925: CWE-434 Unrestricted Upload of File with Dangerous Type in unitecms Unlimited Addons for WPBakery Page Builder
The Unlimited Addons for WPBakery Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'importZipFile' function in versions up to, and including, 1.0.42. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin (the default is editor role, but access can also be granted to contributor role), to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2023-6925 is a high-severity vulnerability affecting the Unlimited Addons for WPBakery Page Builder plugin for WordPress, specifically versions up to and including 1.0.42. The vulnerability arises from insufficient validation of file types in the 'importZipFile' function, which allows authenticated users with certain roles (by default editor, but also contributor if granted access) to upload arbitrary files to the server hosting the WordPress site. This unrestricted file upload vulnerability (CWE-434) can be exploited to upload malicious files, potentially leading to remote code execution (RCE) on the affected server. The vulnerability requires that the attacker has an authenticated account with elevated privileges (at least editor role with plugin access), but does not require user interaction beyond authentication. The CVSS v3.1 base score is 7.2, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the vulnerability poses a significant risk due to the common use of WPBakery Page Builder and its addons in WordPress sites, which are widely deployed across many industries and regions. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability can lead to severe consequences including unauthorized access to sensitive data, website defacement, service disruption, and full server compromise through remote code execution. Organizations relying on WordPress sites with the Unlimited Addons for WPBakery Page Builder plugin are at risk of attackers leveraging compromised editor or contributor accounts to upload web shells or other malicious payloads. This can result in data breaches affecting personal data protected under GDPR, reputational damage, and potential regulatory penalties. The impact is particularly critical for sectors with high web presence such as e-commerce, media, government, and education. Additionally, compromised websites can be used as launchpads for further attacks within corporate networks or for distributing malware to visitors, amplifying the threat landscape for European entities.
Mitigation Recommendations
1. Immediately audit user roles and permissions on WordPress sites to ensure that only trusted users have editor or contributor roles with access to the Unlimited Addons plugin. 2. Restrict plugin access strictly to necessary users and consider temporarily disabling the plugin if possible until a patch is available. 3. Implement web application firewalls (WAF) with rules to detect and block suspicious file upload attempts, especially targeting ZIP or archive uploads. 4. Monitor server and application logs for unusual file upload activity or unexpected file types in upload directories. 5. Employ file integrity monitoring to detect unauthorized changes or additions to web directories. 6. Keep WordPress core, themes, and all plugins up to date and subscribe to vendor security advisories for timely patch releases. 7. Consider deploying security plugins that enforce strict file upload validation and sandboxing. 8. Conduct regular security awareness training for users with elevated roles to prevent credential compromise. 9. If feasible, isolate WordPress instances in segmented network zones to limit lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2023-6925: CWE-434 Unrestricted Upload of File with Dangerous Type in unitecms Unlimited Addons for WPBakery Page Builder
Description
The Unlimited Addons for WPBakery Page Builder plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'importZipFile' function in versions up to, and including, 1.0.42. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin (the default is editor role, but access can also be granted to contributor role), to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Technical Analysis
CVE-2023-6925 is a high-severity vulnerability affecting the Unlimited Addons for WPBakery Page Builder plugin for WordPress, specifically versions up to and including 1.0.42. The vulnerability arises from insufficient validation of file types in the 'importZipFile' function, which allows authenticated users with certain roles (by default editor, but also contributor if granted access) to upload arbitrary files to the server hosting the WordPress site. This unrestricted file upload vulnerability (CWE-434) can be exploited to upload malicious files, potentially leading to remote code execution (RCE) on the affected server. The vulnerability requires that the attacker has an authenticated account with elevated privileges (at least editor role with plugin access), but does not require user interaction beyond authentication. The CVSS v3.1 base score is 7.2, reflecting network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known in the wild, the vulnerability poses a significant risk due to the common use of WPBakery Page Builder and its addons in WordPress sites, which are widely deployed across many industries and regions. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability can lead to severe consequences including unauthorized access to sensitive data, website defacement, service disruption, and full server compromise through remote code execution. Organizations relying on WordPress sites with the Unlimited Addons for WPBakery Page Builder plugin are at risk of attackers leveraging compromised editor or contributor accounts to upload web shells or other malicious payloads. This can result in data breaches affecting personal data protected under GDPR, reputational damage, and potential regulatory penalties. The impact is particularly critical for sectors with high web presence such as e-commerce, media, government, and education. Additionally, compromised websites can be used as launchpads for further attacks within corporate networks or for distributing malware to visitors, amplifying the threat landscape for European entities.
Mitigation Recommendations
1. Immediately audit user roles and permissions on WordPress sites to ensure that only trusted users have editor or contributor roles with access to the Unlimited Addons plugin. 2. Restrict plugin access strictly to necessary users and consider temporarily disabling the plugin if possible until a patch is available. 3. Implement web application firewalls (WAF) with rules to detect and block suspicious file upload attempts, especially targeting ZIP or archive uploads. 4. Monitor server and application logs for unusual file upload activity or unexpected file types in upload directories. 5. Employ file integrity monitoring to detect unauthorized changes or additions to web directories. 6. Keep WordPress core, themes, and all plugins up to date and subscribe to vendor security advisories for timely patch releases. 7. Consider deploying security plugins that enforce strict file upload validation and sandboxing. 8. Conduct regular security awareness training for users with elevated roles to prevent credential compromise. 9. If feasible, isolate WordPress instances in segmented network zones to limit lateral movement in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2023-12-18T15:29:33.654Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fa1484d88663aec32e
Added to database: 5/20/2025, 6:59:06 PM
Last enriched: 7/4/2025, 6:42:39 PM
Last updated: 8/15/2025, 11:31:04 PM
Views: 11
Related Threats
CVE-2025-8293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Theerawat Patthawee Intl DateTime Calendar
MediumCVE-2025-7686: CWE-352 Cross-Site Request Forgery (CSRF) in lmyoaoa weichuncai(WP伪春菜)
MediumCVE-2025-7684: CWE-352 Cross-Site Request Forgery (CSRF) in remysharp Last.fm Recent Album Artwork
MediumCVE-2025-7683: CWE-352 Cross-Site Request Forgery (CSRF) in janyksteenbeek LatestCheckins
MediumCVE-2025-7668: CWE-352 Cross-Site Request Forgery (CSRF) in timothyja Linux Promotional Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.