CVE-2025-10647: CWE-434 Unrestricted Upload of File with Dangerous Type in salzano Embed PDF for WPForms
The Embed PDF for WPForms plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_handler_download_pdf_media function in all versions up to, and including, 1.1.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-10647 is a high-severity vulnerability affecting the Embed PDF for WPForms plugin for WordPress, identified as CWE-434: Unrestricted Upload of File with Dangerous Type. The vulnerability exists due to missing file type validation in the ajax_handler_download_pdf_media function across all versions up to and including 1.1.5. This flaw allows authenticated attackers with as low as Subscriber-level access to upload arbitrary files to the affected server. Because the plugin fails to properly restrict or validate the types of files uploaded, attackers can upload malicious files such as web shells or scripts, potentially leading to remote code execution (RCE). The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring only low privileges without user interaction. The vulnerability is particularly dangerous because WordPress sites often have multiple users with Subscriber or higher roles, and the plugin is used to embed PDFs in forms, a common feature in many websites. Exploitation could allow attackers to execute arbitrary code, compromise the server, steal sensitive data, deface websites, or use the server as a pivot point for further attacks. No public exploits are known yet, but the vulnerability is published and should be addressed promptly.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on WordPress-based websites for business operations, customer engagement, or internal portals. Successful exploitation could lead to data breaches involving personal data protected under GDPR, resulting in legal and financial penalties. The ability to execute arbitrary code on web servers can disrupt business continuity by defacing websites, injecting malware, or causing denial of service. Organizations in sectors such as e-commerce, government, education, and healthcare that use WPForms and the Embed PDF plugin are particularly at risk. The breach of confidentiality and integrity could damage reputation and trust with customers and partners. Additionally, compromised servers could be leveraged for broader attacks, including lateral movement within networks or launching attacks against other targets, increasing the overall threat landscape for European entities.
Mitigation Recommendations
Immediate mitigation steps include updating the Embed PDF for WPForms plugin to a patched version once released by the vendor. Until a patch is available, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. Implement strict access controls to limit Subscriber-level privileges only to trusted users, and audit user roles regularly. Employ web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts, especially those targeting the ajax_handler_download_pdf_media endpoint. Monitor server logs for unusual file upload activity or unexpected file types. Harden the web server environment by disabling execution permissions in upload directories to prevent execution of uploaded malicious files. Regularly back up website data and configurations to enable rapid recovery. Conduct security awareness training for administrators and users about the risks of plugin vulnerabilities and the importance of timely updates.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-10647: CWE-434 Unrestricted Upload of File with Dangerous Type in salzano Embed PDF for WPForms
Description
The Embed PDF for WPForms plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_handler_download_pdf_media function in all versions up to, and including, 1.1.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Technical Analysis
CVE-2025-10647 is a high-severity vulnerability affecting the Embed PDF for WPForms plugin for WordPress, identified as CWE-434: Unrestricted Upload of File with Dangerous Type. The vulnerability exists due to missing file type validation in the ajax_handler_download_pdf_media function across all versions up to and including 1.1.5. This flaw allows authenticated attackers with as low as Subscriber-level access to upload arbitrary files to the affected server. Because the plugin fails to properly restrict or validate the types of files uploaded, attackers can upload malicious files such as web shells or scripts, potentially leading to remote code execution (RCE). The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring only low privileges without user interaction. The vulnerability is particularly dangerous because WordPress sites often have multiple users with Subscriber or higher roles, and the plugin is used to embed PDFs in forms, a common feature in many websites. Exploitation could allow attackers to execute arbitrary code, compromise the server, steal sensitive data, deface websites, or use the server as a pivot point for further attacks. No public exploits are known yet, but the vulnerability is published and should be addressed promptly.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for those relying on WordPress-based websites for business operations, customer engagement, or internal portals. Successful exploitation could lead to data breaches involving personal data protected under GDPR, resulting in legal and financial penalties. The ability to execute arbitrary code on web servers can disrupt business continuity by defacing websites, injecting malware, or causing denial of service. Organizations in sectors such as e-commerce, government, education, and healthcare that use WPForms and the Embed PDF plugin are particularly at risk. The breach of confidentiality and integrity could damage reputation and trust with customers and partners. Additionally, compromised servers could be leveraged for broader attacks, including lateral movement within networks or launching attacks against other targets, increasing the overall threat landscape for European entities.
Mitigation Recommendations
Immediate mitigation steps include updating the Embed PDF for WPForms plugin to a patched version once released by the vendor. Until a patch is available, organizations should consider disabling or uninstalling the plugin to eliminate the attack surface. Implement strict access controls to limit Subscriber-level privileges only to trusted users, and audit user roles regularly. Employ web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts, especially those targeting the ajax_handler_download_pdf_media endpoint. Monitor server logs for unusual file upload activity or unexpected file types. Harden the web server environment by disabling execution permissions in upload directories to prevent execution of uploaded malicious files. Regularly back up website data and configurations to enable rapid recovery. Conduct security awareness training for administrators and users about the risks of plugin vulnerabilities and the importance of timely updates.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-17T18:04:48.301Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cd76f94b8a032c4faa63a7
Added to database: 9/19/2025, 3:30:01 PM
Last enriched: 9/19/2025, 3:31:34 PM
Last updated: 11/2/2025, 3:20:35 AM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12603: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowCVE-2025-12602: CWE-787 Out-of-bounds Write in Azure Access Technology BLU-IC2
LowASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
HighCVE-2025-12599: CWE-321 Use of Hard-coded Cryptographic Key in Azure Access Technology BLU-IC2
CriticalCVE-2025-12601: CWE-730 Denial of Service in Azure Access Technology BLU-IC2
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.