Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11967: CWE-434 Unrestricted Upload of File with Dangerous Type in getwpfunnels Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more

0
High
VulnerabilityCVE-2025-11967cvecve-2025-11967cwe-434
Published: Sat Nov 08 2025 (11/08/2025, 09:28:11 UTC)
Source: CVE Database V5
Vendor/Project: getwpfunnels
Product: Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more

Description

The Mail Mint plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_contact_attribute_import function in all versions up to, and including, 1.18.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 11/15/2025, 09:57:14 UTC

Technical Analysis

CVE-2025-11967 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Mail Mint WordPress plugin, which is used for newsletters, email marketing, automation, WooCommerce emails, and post notifications. The vulnerability arises from the process_contact_attribute_import function lacking proper validation of uploaded file types, allowing authenticated users with administrator privileges or higher to upload arbitrary files to the server. This can lead to remote code execution (RCE) if malicious files are uploaded and executed, compromising the affected website and potentially the underlying server. The vulnerability affects all versions up to and including 1.18.10. The CVSS v3.1 base score is 7.2, indicating high severity, with an attack vector of network, low attack complexity, requiring high privileges but no user interaction. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the administrative access requirement and the critical impact on confidentiality, integrity, and availability. This vulnerability is particularly concerning for WordPress sites integrated with WooCommerce, as these are common in e-commerce and marketing environments. The lack of patch links suggests a fix may not yet be publicly available, emphasizing the need for immediate risk mitigation.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, especially for those relying on WordPress and the Mail Mint plugin for marketing and e-commerce operations. Successful exploitation could lead to full server compromise, data breaches involving customer and business data, defacement of websites, disruption of services, and potential lateral movement within corporate networks. This could result in financial losses, reputational damage, and regulatory penalties under GDPR due to unauthorized access to personal data. Organizations with WooCommerce integrations are at particular risk as these environments often handle sensitive payment and customer information. The requirement for administrator-level access limits the attack surface but insider threats or compromised admin credentials could facilitate exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially as threat actors often develop exploits rapidly after disclosure. The vulnerability's network attack vector means remote exploitation is possible once credentials are obtained, increasing the urgency for mitigation.

Mitigation Recommendations

1. Immediately restrict administrator-level access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit all file upload activities and administrator actions within WordPress to detect suspicious behavior early. 3. Until an official patch is released, consider disabling or removing the Mail Mint plugin if feasible, especially on critical systems. 4. Implement web application firewalls (WAF) with custom rules to block potentially malicious file uploads targeting the vulnerable function. 5. Regularly update WordPress core, plugins, and themes to the latest versions once patches become available. 6. Conduct security awareness training for administrators to recognize phishing and social engineering attempts that could lead to credential theft. 7. Employ file integrity monitoring on web servers to detect unauthorized file changes or uploads. 8. Segment the network to limit the impact of a potential compromise and isolate critical systems from the web server hosting WordPress. 9. Prepare incident response plans specifically addressing web application compromises and ensure backups are current and tested for restoration.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-20T15:11:14.944Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690f0e9f15ddfe7d54073e88

Added to database: 11/8/2025, 9:34:23 AM

Last enriched: 11/15/2025, 9:57:14 AM

Last updated: 12/23/2025, 12:49:56 PM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats