Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2891: CWE-434 Unrestricted Upload of File with Dangerous Type in contempoinc Real Estate 7 WordPress

0
High
VulnerabilityCVE-2025-2891cvecve-2025-2891cwe-434
Published: Tue Apr 01 2025 (04/01/2025, 07:29:12 UTC)
Source: CVE Database V5
Vendor/Project: contempoinc
Product: Real Estate 7 WordPress

Description

CVE-2025-2891 is a high-severity vulnerability in the Real Estate 7 WordPress theme by contempoinc, affecting all versions up to 3. 5. 4. It allows authenticated users with Seller-level access or higher to upload arbitrary files due to missing file type validation in the 'template-submit-listing. php' script. This unrestricted file upload can lead to remote code execution if front-end listing submissions are enabled, compromising confidentiality, integrity, and availability of the affected site. The vulnerability requires authentication but no user interaction beyond that, and it can be exploited remotely over the network. No known exploits are currently reported in the wild. Organizations using this theme on WordPress sites should urgently apply mitigations to prevent potential compromise. The vulnerability poses significant risk especially to real estate businesses and websites relying on this theme globally, with particular concern in countries with high WordPress usage and active real estate markets.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:30:25 UTC

Technical Analysis

CVE-2025-2891 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Real Estate 7 WordPress theme developed by contempoinc. The issue resides in the 'template-submit-listing.php' file, which lacks proper validation of uploaded file types. This flaw allows authenticated users with Seller-level privileges or higher to upload arbitrary files to the server hosting the WordPress site. Because the theme supports front-end listing submissions, an attacker can exploit this to upload malicious files such as web shells or scripts, potentially leading to remote code execution (RCE). The vulnerability affects all versions up to and including 3.5.4. The CVSS v3.1 base score is 8.8, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are known at this time, the vulnerability's characteristics make it a critical risk for sites using this theme, especially if front-end listing submissions are enabled. The lack of patch links suggests a fix may not yet be available, emphasizing the need for immediate mitigation.

Potential Impact

The vulnerability allows attackers with Seller-level access to upload arbitrary files, which can lead to remote code execution on the affected server. This compromises the confidentiality of sensitive data stored on the site, the integrity of website content and backend systems, and the availability of the service if attackers deploy destructive payloads or ransomware. Exploitation could result in full site takeover, data breaches, defacement, or use of the compromised server as a pivot point for further attacks within an organization's network. Given WordPress's widespread use and the popularity of the Real Estate 7 theme in real estate websites, the impact is significant globally. Organizations relying on this theme for customer-facing real estate listings are at risk of reputational damage, financial loss, and regulatory penalties if customer data is exposed or services disrupted.

Mitigation Recommendations

Until an official patch is released, organizations should take the following specific actions: 1) Disable front-end listing submissions to prevent attackers from uploading files via the vulnerable script. 2) Restrict file upload permissions on the server to only allow safe file types and enforce strict server-side validation. 3) Implement web application firewall (WAF) rules to detect and block suspicious file upload attempts targeting 'template-submit-listing.php'. 4) Monitor server logs and file system changes for unauthorized uploads or execution of unexpected scripts. 5) Limit Seller-level user privileges to trusted users only and review existing accounts for suspicious activity. 6) Consider temporarily replacing the Real Estate 7 theme with a secure alternative if possible. 7) Stay alert for official patches or updates from contempoinc and apply them promptly once available. 8) Conduct regular security audits and penetration tests focusing on file upload functionalities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-27T22:33:54.107Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b26b7ef31ef0b54eb2d

Added to database: 2/25/2026, 9:35:34 PM

Last enriched: 2/25/2026, 10:30:25 PM

Last updated: 2/26/2026, 8:06:59 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats