Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3616: CWE-434 Unrestricted Upload of File with Dangerous Type in wpsoul Greenshift – animation and page builder blocks

0
High
VulnerabilityCVE-2025-3616cvecve-2025-3616cwe-434
Published: Tue Apr 22 2025 (04/22/2025, 04:21:32 UTC)
Source: CVE
Vendor/Project: wpsoul
Product: Greenshift – animation and page builder blocks

Description

The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gspb_make_proxy_api_request() function in versions 11.4 to 11.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The arbitrary file upload was sufficiently patched in 11.4.5, but a capability check was added in 11.4.6 to properly prevent unauthorized limited file uploads.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:39:27 UTC

Technical Analysis

The vulnerability identified as CVE-2025-3616 affects the Greenshift – animation and page builder blocks plugin for WordPress, specifically versions 11.4 through 11.4.5. The root cause is a lack of proper file type validation in the gspb_make_proxy_api_request() function, which handles file uploads. This flaw permits authenticated users with Subscriber-level permissions or higher to upload arbitrary files to the server hosting the WordPress site. Since WordPress Subscriber roles are low-privilege accounts typically assigned to general users, this broadens the attack surface significantly. The arbitrary file upload can be leveraged to upload malicious scripts or web shells, potentially enabling remote code execution (RCE) and full server compromise. The vulnerability was addressed in two stages: version 11.4.5 introduced file upload restrictions to prevent arbitrary uploads, and version 11.4.6 added capability checks to ensure only authorized users can perform limited file uploads. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring only privileges equivalent to Subscriber role. No user interaction is needed beyond authentication. There are no known active exploits in the wild as of the publication date. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), a common vector for web application compromise. The plugin is widely used in WordPress sites for animation and page building, making this vulnerability a significant risk for affected installations.

Potential Impact

The impact of CVE-2025-3616 is severe for organizations running WordPress sites with the vulnerable Greenshift plugin. Successful exploitation allows attackers with minimal privileges (Subscriber-level) to upload arbitrary files, which can lead to remote code execution and full server takeover. This compromises the confidentiality of sensitive data, integrity of website content, and availability of services. Attackers could deploy web shells, pivot within the network, exfiltrate data, or deface websites. Given WordPress's popularity and the plugin's usage in many sites, the vulnerability poses a widespread risk. Compromised sites may be used to distribute malware, conduct phishing campaigns, or serve as footholds for further attacks. The requirement for authentication limits exposure but does not eliminate risk, as many sites allow user registrations or have compromised credentials. The absence of known exploits in the wild currently reduces immediate threat but does not preclude rapid exploitation once public disclosure is made. Organizations face reputational damage, regulatory penalties, and operational disruption if exploited.

Mitigation Recommendations

To mitigate CVE-2025-3616, organizations should immediately update the Greenshift plugin to version 11.4.6 or later, which includes both file type validation and capability checks to prevent unauthorized uploads. If immediate update is not possible, temporarily disable the plugin or restrict user registrations to trusted users only. Implement strict access controls to limit Subscriber-level permissions and monitor user accounts for suspicious activity. Employ web application firewalls (WAFs) with rules to detect and block malicious file uploads targeting this plugin. Conduct regular file integrity monitoring to detect unauthorized changes or uploads. Review server logs for anomalous upload activity. Harden the WordPress environment by disabling PHP execution in upload directories and isolating the web server from critical backend systems. Educate site administrators about the risk and ensure timely patch management. Finally, consider implementing multi-factor authentication to reduce risk of compromised credentials enabling exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-14T21:53:28.375Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf7731

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 2/27/2026, 1:39:27 PM

Last updated: 3/25/2026, 4:41:07 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses