Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13329: CWE-434 Unrestricted Upload of File with Dangerous Type in snowray File Uploader for WooCommerce

0
Critical
VulnerabilityCVE-2025-13329cvecve-2025-13329cwe-434
Published: Sat Dec 20 2025 (12/20/2025, 03:20:24 UTC)
Source: CVE Database V5
Vendor/Project: snowray
Product: File Uploader for WooCommerce

Description

The File Uploader for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the callback function for the 'add-image-data' REST API endpoint in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to upload arbitrary files to the Uploadcare service and subsequently download them on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 12/20/2025, 03:51:42 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13329 affects the File Uploader for WooCommerce plugin for WordPress, specifically all versions up to 1.0.3. The root cause is the lack of proper file type validation in the callback function handling the 'add-image-data' REST API endpoint. This flaw allows unauthenticated attackers to upload arbitrary files to the Uploadcare service, which are then retrievable and stored on the affected WordPress server. Because the plugin fails to restrict dangerous file types, attackers can upload malicious payloads, including web shells or scripts, potentially leading to remote code execution (RCE). The vulnerability is exploitable remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates a critical severity level, reflecting the ease of exploitation and the high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant threat to WordPress sites using this plugin, especially e-commerce platforms relying on WooCommerce. The lack of a patch at the time of disclosure increases the urgency for mitigation. Attackers exploiting this vulnerability could gain full control over the affected server, steal sensitive customer data, deface websites, or use the compromised server as a pivot point for further attacks.

Potential Impact

For European organizations, the impact of this vulnerability is substantial. WooCommerce is widely used across Europe for e-commerce, and many businesses rely on the File Uploader for WooCommerce plugin to manage customer uploads. Exploitation could lead to full server compromise, resulting in data breaches involving customer personal and payment information, which would have severe GDPR compliance implications and potential financial penalties. The integrity of e-commerce platforms could be undermined, leading to loss of customer trust and revenue. Availability could also be affected if attackers deploy ransomware or disrupt services. Given the critical nature of the vulnerability and the absence of required authentication, attackers can easily target vulnerable sites en masse. This risk is heightened for organizations with limited security monitoring or patch management capabilities. Additionally, the ability to execute remote code could allow attackers to establish persistent backdoors, facilitating long-term espionage or fraud. The reputational damage and operational disruption could be significant, especially for SMEs and large retailers in Europe.

Mitigation Recommendations

Until an official patch is released, European organizations should immediately disable the File Uploader for WooCommerce plugin to prevent exploitation. If disabling is not feasible, restrict access to the REST API endpoints related to the plugin using web application firewalls (WAFs) or IP whitelisting to block unauthenticated requests. Implement strict file upload policies by validating file types and sizes at multiple layers, including server-side checks independent of the plugin. Monitor web server logs and Uploadcare service activity for unusual file uploads or downloads. Employ intrusion detection systems (IDS) to detect anomalous behavior indicative of exploitation attempts. Regularly audit WordPress installations and plugins for unauthorized changes or new files. Educate development and operations teams about the risk and ensure rapid deployment of patches once available. Consider isolating the WordPress environment using containerization or sandboxing to limit the impact of potential compromises. Finally, maintain comprehensive backups and test restoration procedures to recover quickly from any successful attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-17T18:50:29.412Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694619d2c376abdb7ecb86a5

Added to database: 12/20/2025, 3:36:50 AM

Last enriched: 12/20/2025, 3:51:42 AM

Last updated: 12/20/2025, 10:02:38 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats