CVE-2025-13329: CWE-434 Unrestricted Upload of File with Dangerous Type in snowray File Uploader for WooCommerce
The File Uploader for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the callback function for the 'add-image-data' REST API endpoint in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to upload arbitrary files to the Uploadcare service and subsequently download them on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-13329 affects the File Uploader for WooCommerce plugin for WordPress, specifically all versions up to 1.0.3. The root cause is the lack of proper file type validation in the callback function handling the 'add-image-data' REST API endpoint. This flaw allows unauthenticated attackers to upload arbitrary files to the Uploadcare service, which are then retrievable and stored on the affected WordPress server. Because the plugin fails to restrict dangerous file types, attackers can upload malicious payloads, including web shells or scripts, potentially leading to remote code execution (RCE). The vulnerability is exploitable remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates a critical severity level, reflecting the ease of exploitation and the high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant threat to WordPress sites using this plugin, especially e-commerce platforms relying on WooCommerce. The lack of a patch at the time of disclosure increases the urgency for mitigation. Attackers exploiting this vulnerability could gain full control over the affected server, steal sensitive customer data, deface websites, or use the compromised server as a pivot point for further attacks.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. WooCommerce is widely used across Europe for e-commerce, and many businesses rely on the File Uploader for WooCommerce plugin to manage customer uploads. Exploitation could lead to full server compromise, resulting in data breaches involving customer personal and payment information, which would have severe GDPR compliance implications and potential financial penalties. The integrity of e-commerce platforms could be undermined, leading to loss of customer trust and revenue. Availability could also be affected if attackers deploy ransomware or disrupt services. Given the critical nature of the vulnerability and the absence of required authentication, attackers can easily target vulnerable sites en masse. This risk is heightened for organizations with limited security monitoring or patch management capabilities. Additionally, the ability to execute remote code could allow attackers to establish persistent backdoors, facilitating long-term espionage or fraud. The reputational damage and operational disruption could be significant, especially for SMEs and large retailers in Europe.
Mitigation Recommendations
Until an official patch is released, European organizations should immediately disable the File Uploader for WooCommerce plugin to prevent exploitation. If disabling is not feasible, restrict access to the REST API endpoints related to the plugin using web application firewalls (WAFs) or IP whitelisting to block unauthenticated requests. Implement strict file upload policies by validating file types and sizes at multiple layers, including server-side checks independent of the plugin. Monitor web server logs and Uploadcare service activity for unusual file uploads or downloads. Employ intrusion detection systems (IDS) to detect anomalous behavior indicative of exploitation attempts. Regularly audit WordPress installations and plugins for unauthorized changes or new files. Educate development and operations teams about the risk and ensure rapid deployment of patches once available. Consider isolating the WordPress environment using containerization or sandboxing to limit the impact of potential compromises. Finally, maintain comprehensive backups and test restoration procedures to recover quickly from any successful attacks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13329: CWE-434 Unrestricted Upload of File with Dangerous Type in snowray File Uploader for WooCommerce
Description
The File Uploader for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the callback function for the 'add-image-data' REST API endpoint in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to upload arbitrary files to the Uploadcare service and subsequently download them on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-13329 affects the File Uploader for WooCommerce plugin for WordPress, specifically all versions up to 1.0.3. The root cause is the lack of proper file type validation in the callback function handling the 'add-image-data' REST API endpoint. This flaw allows unauthenticated attackers to upload arbitrary files to the Uploadcare service, which are then retrievable and stored on the affected WordPress server. Because the plugin fails to restrict dangerous file types, attackers can upload malicious payloads, including web shells or scripts, potentially leading to remote code execution (RCE). The vulnerability is exploitable remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates a critical severity level, reflecting the ease of exploitation and the high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability poses a significant threat to WordPress sites using this plugin, especially e-commerce platforms relying on WooCommerce. The lack of a patch at the time of disclosure increases the urgency for mitigation. Attackers exploiting this vulnerability could gain full control over the affected server, steal sensitive customer data, deface websites, or use the compromised server as a pivot point for further attacks.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. WooCommerce is widely used across Europe for e-commerce, and many businesses rely on the File Uploader for WooCommerce plugin to manage customer uploads. Exploitation could lead to full server compromise, resulting in data breaches involving customer personal and payment information, which would have severe GDPR compliance implications and potential financial penalties. The integrity of e-commerce platforms could be undermined, leading to loss of customer trust and revenue. Availability could also be affected if attackers deploy ransomware or disrupt services. Given the critical nature of the vulnerability and the absence of required authentication, attackers can easily target vulnerable sites en masse. This risk is heightened for organizations with limited security monitoring or patch management capabilities. Additionally, the ability to execute remote code could allow attackers to establish persistent backdoors, facilitating long-term espionage or fraud. The reputational damage and operational disruption could be significant, especially for SMEs and large retailers in Europe.
Mitigation Recommendations
Until an official patch is released, European organizations should immediately disable the File Uploader for WooCommerce plugin to prevent exploitation. If disabling is not feasible, restrict access to the REST API endpoints related to the plugin using web application firewalls (WAFs) or IP whitelisting to block unauthenticated requests. Implement strict file upload policies by validating file types and sizes at multiple layers, including server-side checks independent of the plugin. Monitor web server logs and Uploadcare service activity for unusual file uploads or downloads. Employ intrusion detection systems (IDS) to detect anomalous behavior indicative of exploitation attempts. Regularly audit WordPress installations and plugins for unauthorized changes or new files. Educate development and operations teams about the risk and ensure rapid deployment of patches once available. Consider isolating the WordPress environment using containerization or sandboxing to limit the impact of potential compromises. Finally, maintain comprehensive backups and test restoration procedures to recover quickly from any successful attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-17T18:50:29.412Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694619d2c376abdb7ecb86a5
Added to database: 12/20/2025, 3:36:50 AM
Last enriched: 12/20/2025, 3:51:42 AM
Last updated: 12/20/2025, 10:02:38 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalCVE-2025-12820: CWE-862 Missing Authorization in Pure WC Variation Swatches
UnknownCVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.