CVE-2025-11967: CWE-434 Unrestricted Upload of File with Dangerous Type in getwpfunnels Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more
The Mail Mint plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_contact_attribute_import function in all versions up to, and including, 1.18.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-11967 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Mail Mint WordPress plugin, which is used for newsletters, email marketing, automation, WooCommerce emails, and post notifications. The vulnerability arises from the process_contact_attribute_import function lacking proper validation of uploaded file types, allowing authenticated users with administrator privileges or higher to upload arbitrary files to the server. This can lead to remote code execution (RCE) if malicious files are uploaded and executed, compromising the affected website and potentially the underlying server. The vulnerability affects all versions up to and including 1.18.10. The CVSS v3.1 base score is 7.2, indicating high severity, with an attack vector of network, low attack complexity, requiring high privileges but no user interaction. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the administrative access requirement and the critical impact on confidentiality, integrity, and availability. This vulnerability is particularly concerning for WordPress sites integrated with WooCommerce, as these are common in e-commerce and marketing environments. The lack of patch links suggests a fix may not yet be publicly available, emphasizing the need for immediate risk mitigation.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial, especially for those relying on WordPress and the Mail Mint plugin for marketing and e-commerce operations. Successful exploitation could lead to full server compromise, data breaches involving customer and business data, defacement of websites, disruption of services, and potential lateral movement within corporate networks. This could result in financial losses, reputational damage, and regulatory penalties under GDPR due to unauthorized access to personal data. Organizations with WooCommerce integrations are at particular risk as these environments often handle sensitive payment and customer information. The requirement for administrator-level access limits the attack surface but insider threats or compromised admin credentials could facilitate exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially as threat actors often develop exploits rapidly after disclosure. The vulnerability's network attack vector means remote exploitation is possible once credentials are obtained, increasing the urgency for mitigation.
Mitigation Recommendations
1. Immediately restrict administrator-level access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit all file upload activities and administrator actions within WordPress to detect suspicious behavior early. 3. Until an official patch is released, consider disabling or removing the Mail Mint plugin if feasible, especially on critical systems. 4. Implement web application firewalls (WAF) with custom rules to block potentially malicious file uploads targeting the vulnerable function. 5. Regularly update WordPress core, plugins, and themes to the latest versions once patches become available. 6. Conduct security awareness training for administrators to recognize phishing and social engineering attempts that could lead to credential theft. 7. Employ file integrity monitoring on web servers to detect unauthorized file changes or uploads. 8. Segment the network to limit the impact of a potential compromise and isolate critical systems from the web server hosting WordPress. 9. Prepare incident response plans specifically addressing web application compromises and ensure backups are current and tested for restoration.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-11967: CWE-434 Unrestricted Upload of File with Dangerous Type in getwpfunnels Mail Mint – Newsletters, Email Marketing, Automation, WooCommerce Emails, Post Notification, and more
Description
The Mail Mint plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_contact_attribute_import function in all versions up to, and including, 1.18.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Technical Analysis
CVE-2025-11967 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Mail Mint WordPress plugin, which is used for newsletters, email marketing, automation, WooCommerce emails, and post notifications. The vulnerability arises from the process_contact_attribute_import function lacking proper validation of uploaded file types, allowing authenticated users with administrator privileges or higher to upload arbitrary files to the server. This can lead to remote code execution (RCE) if malicious files are uploaded and executed, compromising the affected website and potentially the underlying server. The vulnerability affects all versions up to and including 1.18.10. The CVSS v3.1 base score is 7.2, indicating high severity, with an attack vector of network, low attack complexity, requiring high privileges but no user interaction. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the administrative access requirement and the critical impact on confidentiality, integrity, and availability. This vulnerability is particularly concerning for WordPress sites integrated with WooCommerce, as these are common in e-commerce and marketing environments. The lack of patch links suggests a fix may not yet be publicly available, emphasizing the need for immediate risk mitigation.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial, especially for those relying on WordPress and the Mail Mint plugin for marketing and e-commerce operations. Successful exploitation could lead to full server compromise, data breaches involving customer and business data, defacement of websites, disruption of services, and potential lateral movement within corporate networks. This could result in financial losses, reputational damage, and regulatory penalties under GDPR due to unauthorized access to personal data. Organizations with WooCommerce integrations are at particular risk as these environments often handle sensitive payment and customer information. The requirement for administrator-level access limits the attack surface but insider threats or compromised admin credentials could facilitate exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially as threat actors often develop exploits rapidly after disclosure. The vulnerability's network attack vector means remote exploitation is possible once credentials are obtained, increasing the urgency for mitigation.
Mitigation Recommendations
1. Immediately restrict administrator-level access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit all file upload activities and administrator actions within WordPress to detect suspicious behavior early. 3. Until an official patch is released, consider disabling or removing the Mail Mint plugin if feasible, especially on critical systems. 4. Implement web application firewalls (WAF) with custom rules to block potentially malicious file uploads targeting the vulnerable function. 5. Regularly update WordPress core, plugins, and themes to the latest versions once patches become available. 6. Conduct security awareness training for administrators to recognize phishing and social engineering attempts that could lead to credential theft. 7. Employ file integrity monitoring on web servers to detect unauthorized file changes or uploads. 8. Segment the network to limit the impact of a potential compromise and isolate critical systems from the web server hosting WordPress. 9. Prepare incident response plans specifically addressing web application compromises and ensure backups are current and tested for restoration.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-20T15:11:14.944Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690f0e9f15ddfe7d54073e88
Added to database: 11/8/2025, 9:34:23 AM
Last enriched: 11/15/2025, 9:57:14 AM
Last updated: 12/24/2025, 12:38:18 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15048: Command Injection in Tenda WH450
MediumCVE-2025-68696: CWE-918: Server-Side Request Forgery (SSRF) in jnunemaker httparty
HighCVE-2025-68665: CWE-502: Deserialization of Untrusted Data in langchain-ai langchainjs
HighCVE-2025-15049: SQL Injection in code-projects Online Farm System
MediumCVE-2025-68664: CWE-502: Deserialization of Untrusted Data in langchain-ai langchain
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.