Skip to main content

CVE-2025-10049: CWE-434 Unrestricted Upload of File with Dangerous Type in nik00726 Responsive Filterable Portfolio

High
VulnerabilityCVE-2025-10049cvecve-2025-10049cwe-434
Published: Wed Sep 10 2025 (09/10/2025, 06:38:44 UTC)
Source: CVE Database V5
Vendor/Project: nik00726
Product: Responsive Filterable Portfolio

Description

The Responsive Filterable Portfolio plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the HdnMediaSelection_image field in all versions up to, and including, 1.0.24. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 09/10/2025, 07:00:26 UTC

Technical Analysis

CVE-2025-10049 is a high-severity vulnerability affecting the Responsive Filterable Portfolio plugin for WordPress, developed by nik00726. The vulnerability arises from improper file type validation in the HdnMediaSelection_image field, allowing authenticated users with Administrator-level privileges or higher to upload arbitrary files to the web server. This lack of validation corresponds to CWE-434, which concerns unrestricted file upload of dangerous types. Because the plugin accepts files without verifying their type or content, an attacker can upload malicious files such as web shells or scripts that could be executed remotely, potentially leading to remote code execution (RCE). The vulnerability affects all versions up to and including 1.0.24. The CVSS v3.1 base score is 7.2, reflecting a high severity due to network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability poses a significant risk given the widespread use of WordPress and the plugin's administrative access requirement. Exploitation would allow an attacker to fully compromise the affected WordPress site, potentially pivoting to other internal systems or stealing sensitive data. The vulnerability is particularly critical because it leverages a common plugin, and the attack vector is through authenticated administrative users, who may be targeted via phishing or credential compromise. No official patches or updates have been linked yet, so mitigation currently relies on restricting access and monitoring.

Potential Impact

For European organizations, this vulnerability presents a substantial risk, especially for those relying on WordPress sites with the Responsive Filterable Portfolio plugin installed. Successful exploitation could lead to full site compromise, data breaches involving personal data protected under GDPR, defacement, or use of the site as a launchpad for further attacks within the corporate network. The loss of confidentiality, integrity, and availability could disrupt business operations, damage reputation, and result in regulatory penalties. Organizations in sectors such as finance, healthcare, government, and e-commerce are particularly vulnerable due to the sensitive nature of their data and the regulatory environment in Europe. Additionally, the ability to execute arbitrary code remotely could facilitate ransomware deployment or lateral movement, increasing the potential impact. Since the vulnerability requires administrative access, the risk is heightened if credential theft or insider threats are present. Given the plugin’s popularity in European WordPress deployments, the threat surface is significant.

Mitigation Recommendations

1. Immediately audit WordPress installations to identify the presence of the Responsive Filterable Portfolio plugin and its version. 2. Restrict administrative access to trusted personnel only and enforce strong multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Implement strict file upload controls at the web server or application firewall level to block unauthorized file types, especially executable scripts. 4. Monitor logs for unusual file upload activity or unexpected changes in the plugin’s upload directories. 5. If possible, disable or remove the plugin until a security patch or update is released by the vendor. 6. Employ web application firewalls (WAFs) with rules targeting file upload anomalies and known attack patterns. 7. Conduct regular security awareness training to reduce the risk of phishing attacks that could lead to administrative credential compromise. 8. Backup WordPress sites and databases regularly to enable quick recovery in case of compromise. 9. Stay informed about vendor updates or patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-05T18:50:44.711Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c11e7ce55cc6e90d9f3b4d

Added to database: 9/10/2025, 6:45:16 AM

Last enriched: 9/10/2025, 7:00:26 AM

Last updated: 9/10/2025, 7:52:51 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats