Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13065: CWE-434 Unrestricted Upload of File with Dangerous Type in brainstormforce Starter Templates – AI-Powered Templates for Elementor & Gutenberg

0
High
VulnerabilityCVE-2025-13065cvecve-2025-13065cwe-434
Published: Sat Dec 06 2025 (12/06/2025, 09:25:58 UTC)
Source: CVE Database V5
Vendor/Project: brainstormforce
Product: Starter Templates – AI-Powered Templates for Elementor & Gutenberg

Description

The Starter Templates plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 4.4.41. This is due to insufficient file type validation detecting WXR files, allowing double extension files to bypass sanitization while being accepted as a valid WXR file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:27:57 UTC

Technical Analysis

CVE-2025-13065 is a vulnerability identified in the Brainstormforce Starter Templates plugin for WordPress, which supports Elementor and Gutenberg page builders. The flaw arises from insufficient validation of uploaded files that are expected to be WXR (WordPress eXtended RSS) files. The plugin fails to properly detect and block files with double extensions, allowing attackers to upload files that appear as valid WXR files but actually contain executable code or other malicious content. This vulnerability is classified under CWE-434, indicating an unrestricted file upload issue. Exploitation requires the attacker to have at least author-level privileges on the WordPress site, which is a common privilege level for contributors who can upload content. Once exploited, the attacker can upload arbitrary files to the server, potentially leading to remote code execution (RCE). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. The vulnerability affects all versions up to and including 4.4.41 of the plugin. No patches or exploit code are currently publicly available, but the risk remains significant due to the widespread use of the plugin and the commonality of author-level accounts on WordPress sites.

Potential Impact

The impact of CVE-2025-13065 is substantial for organizations using the affected Starter Templates plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the web server. This can result in full site compromise, data theft, defacement, installation of backdoors, or pivoting to other internal systems. Confidentiality is at risk as attackers may access sensitive data stored on the server or database. Integrity is compromised through unauthorized modification of site content or code. Availability can be affected if attackers disrupt site operations or deploy ransomware. Since the vulnerability requires only author-level privileges, it lowers the barrier for exploitation compared to vulnerabilities requiring administrative access. Organizations relying on WordPress for their web presence, especially those using Elementor or Gutenberg with Starter Templates, face a heightened risk of targeted attacks or automated exploitation attempts once the vulnerability becomes widely known.

Mitigation Recommendations

To mitigate CVE-2025-13065, organizations should immediately update the Starter Templates plugin to a version where this vulnerability is patched once available. Until an official patch is released, administrators should restrict author-level privileges to trusted users only and review existing author accounts for suspicious activity. Implementing a Web Application Firewall (WAF) with rules to detect and block suspicious file uploads or double extension files can provide temporary protection. Additionally, disabling file uploads for authors if not strictly necessary reduces attack surface. Monitoring server logs for unusual file upload activity or execution attempts is critical. Employing file integrity monitoring to detect unauthorized changes on the server can help identify exploitation attempts early. Finally, applying the principle of least privilege across WordPress roles and ensuring the server environment follows security best practices (e.g., disabling execution in upload directories) will further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-12T13:09:09.667Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6933f997b96ba7cdea885820

Added to database: 12/6/2025, 9:38:31 AM

Last enriched: 2/27/2026, 9:27:57 AM

Last updated: 3/26/2026, 4:53:03 AM

Views: 197

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses