Skip to main content

CVE-2025-28951: CWE-434 Unrestricted Upload of File with Dangerous Type in CreedAlly Bulk Featured Image

Critical
VulnerabilityCVE-2025-28951cvecve-2025-28951cwe-434
Published: Fri Jul 04 2025 (07/04/2025, 08:42:11 UTC)
Source: CVE Database V5
Vendor/Project: CreedAlly
Product: Bulk Featured Image

Description

Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image allows Upload a Web Shell to a Web Server. This issue affects Bulk Featured Image: from n/a through 1.2.1.

AI-Powered Analysis

AILast updated: 07/04/2025, 09:10:45 UTC

Technical Analysis

CVE-2025-28951 is a critical vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the CreedAlly Bulk Featured Image plugin, versions up to and including 1.2.1. The core issue is that the plugin does not properly restrict or validate the types of files that can be uploaded, allowing an attacker with high privileges (PR:H) to upload malicious files, such as web shells, directly to the web server. The vulnerability has a CVSS v3.1 base score of 9.1, indicating a critical severity level. The attack vector is network-based (AV:N), requiring no user interaction (UI:N), but it does require the attacker to have some level of privileges (PR:H), which suggests that the attacker must already have authenticated access with elevated rights to exploit this vulnerability. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Exploiting this vulnerability could allow an attacker to execute arbitrary code on the server, potentially leading to full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks. No patches or exploit code are currently publicly available, and no known exploits in the wild have been reported as of the publication date. However, given the nature of the vulnerability and its critical severity, it represents a significant risk to affected systems.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for those using the CreedAlly Bulk Featured Image plugin in their web infrastructure. Successful exploitation could lead to unauthorized remote code execution, resulting in data breaches, service disruptions, and reputational damage. Confidential information, including personal data protected under GDPR, could be exposed or manipulated, leading to regulatory penalties and loss of customer trust. The ability to upload web shells could also facilitate lateral movement within the network, enabling attackers to compromise additional systems. Organizations in sectors such as e-commerce, media, and any web-dependent services are particularly at risk. The critical nature of the vulnerability means that even organizations with strong perimeter defenses could be compromised if internal privilege controls are insufficient. Additionally, the changed scope of the vulnerability implies that the impact could extend beyond the plugin itself, affecting the broader web server environment and associated applications.

Mitigation Recommendations

Given the absence of an official patch, European organizations should immediately audit their use of the CreedAlly Bulk Featured Image plugin and consider disabling or removing it if not essential. For environments where the plugin is necessary, strict access controls should be enforced to limit the number of users with high privileges capable of uploading files. Implementing web application firewalls (WAFs) with rules to detect and block suspicious file uploads, especially those containing web shells or scripts, can provide an additional layer of defense. File upload validation should be enhanced at the application and server levels to restrict allowed file types and scan uploaded files for malicious content using antivirus and malware detection tools. Monitoring and logging upload activity with alerts for anomalous behavior can help detect exploitation attempts early. Network segmentation and least privilege principles should be applied to limit the potential lateral movement of attackers. Finally, organizations should stay alert for official patches or updates from CreedAlly and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-03-11T08:10:12.306Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686796cb6f40f0eb729fa55d

Added to database: 7/4/2025, 8:54:35 AM

Last enriched: 7/4/2025, 9:10:45 AM

Last updated: 7/9/2025, 7:56:06 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats