Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12968: CWE-434 Unrestricted Upload of File with Dangerous Type in infility Infility Global

0
High
VulnerabilityCVE-2025-12968cvecve-2025-12968cwe-434
Published: Fri Dec 12 2025 (12/12/2025, 03:20:44 UTC)
Source: CVE Database V5
Vendor/Project: infility
Product: Infility Global

Description

The Infility Global plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and capability checks in all versions up to, and including, 2.14.23. This is due to the `upload_file` function in the `infility_import_file` class only validating the MIME type which can be easily spoofed, and the `import_data` function missing capability checks. This makes it possible for authenticated attackers, with subscriber level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:01:07 UTC

Technical Analysis

CVE-2025-12968 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Infility Global plugin for WordPress in all versions up to and including 2.14.23. The core issue stems from the `upload_file` function within the `infility_import_file` class, which performs only MIME type validation on uploaded files. Since MIME types can be easily spoofed by attackers, this validation is insufficient to prevent malicious file uploads. Additionally, the `import_data` function lacks proper capability checks, meaning that users with subscriber-level privileges or higher can exploit this flaw. This combination allows an authenticated attacker to upload arbitrary files to the server hosting the WordPress site. Such arbitrary file uploads can be leveraged to execute remote code, potentially leading to full system compromise. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with attack vector being network-based, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the ease of exploitation and the potential impact make this a critical concern for sites using the Infility Global plugin. The vulnerability is particularly dangerous because subscriber-level users are often numerous and may be less trusted, increasing the attack surface. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for those relying on WordPress sites with the Infility Global plugin installed. Successful exploitation could lead to remote code execution, allowing attackers to gain unauthorized access to sensitive data, modify or delete content, disrupt services, or use the compromised server as a foothold for further attacks within the network. This could impact confidentiality by exposing personal or business data, integrity by altering website content or backend data, and availability by causing service outages or defacements. Organizations in sectors such as e-commerce, media, government, and education that use WordPress extensively are particularly vulnerable. The fact that subscriber-level users can exploit this means that even compromised or malicious low-privilege accounts pose a threat. Given the widespread use of WordPress across Europe and the plugin’s presence, the vulnerability could facilitate targeted attacks or widespread exploitation campaigns once exploits become available. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency of addressing the issue.

Mitigation Recommendations

1. Immediately audit user roles and permissions on WordPress sites using the Infility Global plugin; restrict subscriber-level users from uploading files or disable unnecessary user registrations. 2. Implement web application firewall (WAF) rules to detect and block suspicious file upload attempts, especially those with uncommon or executable file extensions. 3. Employ additional server-side file validation beyond MIME type checks, such as verifying file signatures and restricting allowed file types explicitly. 4. Monitor logs for unusual upload activity or attempts to access uploaded files that could indicate exploitation attempts. 5. Isolate WordPress installations in segmented network zones to limit lateral movement if compromise occurs. 6. Regularly update the Infility Global plugin and WordPress core once patches addressing this vulnerability are released. 7. Consider disabling or removing the Infility Global plugin if it is not essential to reduce attack surface. 8. Educate administrators and users about the risks of file upload vulnerabilities and enforce strong authentication and monitoring practices. 9. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect webshells or other malicious payloads commonly uploaded via such vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-10T17:45:07.108Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9182650da22753edbaf3

Added to database: 12/12/2025, 3:52:34 AM

Last enriched: 12/19/2025, 5:01:07 AM

Last updated: 2/4/2026, 12:18:09 AM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats