Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10049: CWE-434 Unrestricted Upload of File with Dangerous Type in nik00726 Responsive Filterable Portfolio

0
High
VulnerabilityCVE-2025-10049cvecve-2025-10049cwe-434
Published: Wed Sep 10 2025 (09/10/2025, 06:38:44 UTC)
Source: CVE Database V5
Vendor/Project: nik00726
Product: Responsive Filterable Portfolio

Description

The Responsive Filterable Portfolio plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the HdnMediaSelection_image field in all versions up to, and including, 1.0.24. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:03:49 UTC

Technical Analysis

The vulnerability identified as CVE-2025-10049 affects the Responsive Filterable Portfolio plugin for WordPress, developed by nik00726. This plugin, in all versions up to and including 1.0.24, fails to properly validate file types during uploads via the HdnMediaSelection_image field. This missing validation allows authenticated users with Administrator-level privileges to upload arbitrary files to the server hosting the WordPress site. Because the plugin does not restrict the file types, attackers can upload malicious files such as web shells or scripts, potentially enabling remote code execution (RCE). The vulnerability is classified under CWE-434, which concerns unrestricted file upload vulnerabilities. The CVSS v3.1 base score is 7.2, reflecting a high severity due to the network attack vector, low attack complexity, required high privileges, no user interaction, and impacts on confidentiality, integrity, and availability. Although exploitation requires administrator access, the ability to upload arbitrary files can lead to full system compromise. No official patches or updates have been released at the time of this report, and no known exploits have been observed in the wild. The vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple administrators or weak access controls.

Potential Impact

The primary impact of this vulnerability is the potential for remote code execution on affected WordPress servers, which can lead to complete compromise of the website and underlying server infrastructure. Attackers with administrator access can upload malicious payloads, enabling them to execute arbitrary commands, steal sensitive data, deface websites, or pivot to other internal systems. This threatens the confidentiality, integrity, and availability of the affected systems. Organizations relying on this plugin for portfolio display or content management face risks of data breaches, service disruption, and reputational damage. Since WordPress is widely used globally, and administrator accounts are often shared or insufficiently protected, the scope of impact can be broad. The absence of patches increases the window of exposure. Additionally, compromised sites can be used as launchpads for further attacks, including phishing or malware distribution, amplifying the threat beyond the initial target.

Mitigation Recommendations

1. Immediately restrict administrator access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA). 2. Audit existing uploaded files on the server for suspicious or unauthorized content, especially in directories related to the plugin. 3. Disable or uninstall the Responsive Filterable Portfolio plugin until a security patch or update is available. 4. Implement web application firewall (WAF) rules to detect and block suspicious file upload attempts targeting the HdnMediaSelection_image field. 5. Monitor server logs and WordPress activity logs for unusual file upload activity or administrator actions. 6. Regularly back up website data and server configurations to enable recovery in case of compromise. 7. Follow up with the plugin vendor or WordPress security advisories for updates or patches addressing this vulnerability. 8. Consider deploying file integrity monitoring tools to detect unauthorized changes to web files. 9. Educate administrators about the risks of arbitrary file uploads and the importance of least privilege principles. These steps go beyond generic advice by focusing on access control, monitoring, and proactive plugin management specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-05T18:50:44.711Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c11e7ce55cc6e90d9f3b4d

Added to database: 9/10/2025, 6:45:16 AM

Last enriched: 2/27/2026, 6:03:49 PM

Last updated: 3/28/2026, 9:16:53 AM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses