Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13065: CWE-434 Unrestricted Upload of File with Dangerous Type in brainstormforce Starter Templates – AI-Powered Templates for Elementor & Gutenberg

0
High
VulnerabilityCVE-2025-13065cvecve-2025-13065cwe-434
Published: Sat Dec 06 2025 (12/06/2025, 09:25:58 UTC)
Source: CVE Database V5
Vendor/Project: brainstormforce
Product: Starter Templates – AI-Powered Templates for Elementor & Gutenberg

Description

The Starter Templates plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 4.4.41. This is due to insufficient file type validation detecting WXR files, allowing double extension files to bypass sanitization while being accepted as a valid WXR file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 12/06/2025, 09:53:29 UTC

Technical Analysis

CVE-2025-13065 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Starter Templates plugin for WordPress, developed by Brainstormforce. The issue arises from insufficient validation of uploaded file types, specifically the plugin's failure to properly detect and block files with double extensions disguised as WXR files, which are XML-based WordPress export files. Authenticated users with at least author-level permissions can exploit this flaw to upload arbitrary files, including potentially malicious scripts, to the server hosting the WordPress site. Because the plugin accepts these files as valid WXR files, it bypasses sanitization checks. This arbitrary file upload can lead to remote code execution (RCE), allowing attackers to execute commands on the server, compromise site integrity, steal data, or disrupt availability. The vulnerability affects all versions up to and including 4.4.41 of the plugin. The CVSS v3.1 score of 8.8 reflects the vulnerability's network attack vector, low attack complexity, required privileges at the author level, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the widespread use of WordPress and this plugin. The vulnerability was publicly disclosed on December 6, 2025, with no patch links available at the time, emphasizing the need for immediate attention by site administrators.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with the Starter Templates plugin. Successful exploitation could lead to unauthorized access, data breaches, defacement, or full server compromise. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR due to potential data exposure. The ability to execute arbitrary code remotely increases the risk of persistent threats and lateral movement within networks. Organizations in sectors such as e-commerce, media, education, and government, which often use WordPress for public-facing websites, are particularly vulnerable. The impact is exacerbated in environments where multiple users have author-level access, increasing the attack surface. Additionally, the lack of a patch at disclosure time means organizations must rely on compensating controls to mitigate risk temporarily.

Mitigation Recommendations

Immediate mitigation steps include restricting author-level access to trusted users only and auditing existing user privileges to minimize potential attackers. Implement web application firewalls (WAFs) with rules to detect and block suspicious file uploads, especially those with double extensions or unusual MIME types. Disable or limit file upload functionality where not necessary. Monitor server logs for unusual upload activity or execution of unexpected scripts. Employ intrusion detection systems (IDS) to identify exploitation attempts. Until an official patch is released, consider temporarily disabling the Starter Templates plugin or replacing it with alternative solutions. Once a patch becomes available, apply it promptly. Additionally, implement strict input validation and sanitization on all file uploads, and ensure that the WordPress environment and all plugins are kept up to date. Regular backups and incident response plans should be in place to recover quickly from any compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-12T13:09:09.667Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6933f997b96ba7cdea885820

Added to database: 12/6/2025, 9:38:31 AM

Last enriched: 12/6/2025, 9:53:29 AM

Last updated: 12/6/2025, 11:11:37 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats