Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11724: CWE-434 Unrestricted Upload of File with Dangerous Type in erinmorelli EM Beer Manager

0
High
VulnerabilityCVE-2025-11724cvecve-2025-11724cwe-434
Published: Tue Nov 04 2025 (11/04/2025, 04:27:18 UTC)
Source: CVE Database V5
Vendor/Project: erinmorelli
Product: EM Beer Manager

Description

The EM Beer Manager plugin for WordPress is vulnerable to arbitrary file upload leading to remote code execution in all versions up to, and including, 3.2.3. This is due to missing file type validation in the EMBM_Admin_Untappd_Import_image() function and missing authorization checks on the wp_ajax_embm-untappd-import action. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files including PHP files and execute code on the server granted they can provide a mock HTTP server that responds with specific JSON data.

AI-Powered Analysis

AILast updated: 11/04/2025, 04:54:18 UTC

Technical Analysis

CVE-2025-11724 is a critical vulnerability affecting all versions up to and including 3.2.3 of the EM Beer Manager plugin for WordPress. The root cause is the lack of file type validation in the EMBM_Admin_Untappd_Import_image() function combined with missing authorization checks on the wp_ajax_embm-untappd-import AJAX action. This allows any authenticated user with subscriber-level privileges or higher to upload arbitrary files, including executable PHP scripts, by leveraging a crafted HTTP server that returns specific JSON data. Because WordPress subscriber roles typically have limited permissions, this vulnerability significantly elevates risk by enabling remote code execution (RCE) without requiring higher privileges or user interaction. The CVSS 3.1 score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction needed. No official patches or exploit code are currently publicly available, but the vulnerability's nature suggests it could be weaponized quickly. The plugin is used primarily by businesses managing beer-related content, often in hospitality or retail sectors, which may expose critical infrastructure if compromised. The absence of authorization checks means that even low-privileged users can exploit this flaw, making it a severe risk in multi-user WordPress environments. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), a common vector for web server compromise. Detection and mitigation require immediate attention to prevent potential server takeover and data breaches.

Potential Impact

For European organizations, this vulnerability poses a significant threat, especially to those operating WordPress sites using the EM Beer Manager plugin, commonly found in hospitality, beverage retail, and event management sectors. Successful exploitation can lead to full remote code execution, allowing attackers to execute arbitrary commands, deploy malware, steal sensitive data, or disrupt services. This can result in data breaches, reputational damage, regulatory penalties under GDPR, and operational downtime. Since the vulnerability requires only subscriber-level authentication, insider threats or compromised low-privilege accounts can be leveraged to escalate attacks. The hospitality industry in Europe is a critical sector with high digital presence, making it a lucrative target. Additionally, compromised servers could be used as pivot points for broader network intrusions or to launch attacks against customers and partners. The lack of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score indicates that exploitation would have severe consequences. Organizations failing to address this vulnerability risk significant financial and operational impacts.

Mitigation Recommendations

1. Immediately restrict access to the EM Beer Manager plugin's administrative AJAX endpoints by limiting them to trusted roles and IP addresses using WordPress role management and web server access controls. 2. Implement a Web Application Firewall (WAF) with custom rules to detect and block attempts to upload files with dangerous extensions or unusual content types via the vulnerable AJAX action. 3. Monitor WordPress user accounts for unusual subscriber-level activity, including file uploads or AJAX requests to the embm-untappd-import endpoint. 4. If possible, disable or uninstall the EM Beer Manager plugin until a security patch is released. 5. Conduct regular file integrity monitoring on the web server to detect unauthorized PHP or script files. 6. Enforce strict file upload validation and sanitization at the application level, including MIME type checks and file extension whitelisting. 7. Apply the principle of least privilege by auditing and minimizing user roles with subscriber or higher access. 8. Keep WordPress core, themes, and plugins updated and subscribe to vendor security advisories for timely patching once available. 9. Consider isolating WordPress instances running this plugin in segmented network zones to limit lateral movement in case of compromise. 10. Educate site administrators about this vulnerability and encourage vigilance for suspicious activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-13T20:49:35.201Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690984dc2b77ca42b4883e59

Added to database: 11/4/2025, 4:45:16 AM

Last enriched: 11/4/2025, 4:54:18 AM

Last updated: 12/20/2025, 3:56:13 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats