Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10647: CWE-434 Unrestricted Upload of File with Dangerous Type in salzano Embed PDF for WPForms

0
High
VulnerabilityCVE-2025-10647cvecve-2025-10647cwe-434
Published: Fri Sep 19 2025 (09/19/2025, 08:23:58 UTC)
Source: CVE Database V5
Vendor/Project: salzano
Product: Embed PDF for WPForms

Description

The Embed PDF for WPForms plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_handler_download_pdf_media function in all versions up to, and including, 1.1.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 09/19/2025, 15:31:34 UTC

Technical Analysis

CVE-2025-10647 is a high-severity vulnerability affecting the Embed PDF for WPForms plugin for WordPress, identified as CWE-434: Unrestricted Upload of File with Dangerous Type. The vulnerability exists due to missing file type validation in the ajax_handler_download_pdf_media function across all versions up to and including 1.1.5. This flaw allows authenticated attackers with as low as Subscriber-level access to upload arbitrary files to the affected server. Because the plugin fails to properly restrict or validate the types of files uploaded, attackers can upload malicious files such as web shells or scripts, potentially leading to remote code execution (RCE). The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring only low privileges without user interaction. The vulnerability is particularly dangerous because WordPress sites often have multiple users with Subscriber or higher roles, and the plugin is used to embed PDFs in forms, a common feature in many websites. Exploitation could allow attackers to execute arbitrary code, compromise the server, steal sensitive data, deface websites, or use the server as a pivot point for further attacks. No public exploits are known yet, but the vulnerability is published and should be addressed promptly.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for those relying on WordPress-based websites for business operations, customer engagement, or internal portals. Successful exploitation could lead to data breaches involving personal data protected under GDPR, resulting in legal and financial penalties. The ability to execute arbitrary code on web servers can disrupt business continuity by defacing websites, injecting malware, or causing denial of service. Organizations in sectors such as e-commerce, government, education, and healthcare that use WPForms and the Embed PDF plugin are particularly at risk. The breach of confidentiality and integrity could damage reputation and trust with customers and partners. Additionally, compromised servers could be leveraged for broader attacks, including lateral movement within networks or launching attacks against other targets, increasing the overall threat landscape for European entities.

Mitigation Recommendations

Immediate mitigation steps include updating the Embed PDF for WPForms plugin to a patched version once released by the vendor. Until a patch is available, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. Implement strict access controls to limit Subscriber-level privileges only to trusted users, and audit user roles regularly. Employ web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts, especially those targeting the ajax_handler_download_pdf_media endpoint. Monitor server logs for unusual file upload activity or unexpected file types. Harden the web server environment by disabling execution permissions in upload directories to prevent execution of uploaded malicious files. Regularly back up website data and configurations to enable rapid recovery. Conduct security awareness training for administrators and users about the risks of plugin vulnerabilities and the importance of timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-17T18:04:48.301Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cd76f94b8a032c4faa63a7

Added to database: 9/19/2025, 3:30:01 PM

Last enriched: 9/19/2025, 3:31:34 PM

Last updated: 11/2/2025, 3:20:35 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats