CVE-2025-49329: CWE-434 Unrestricted Upload of File with Dangerous Type in Agile Logix Store Locator WordPress
Unrestricted Upload of File with Dangerous Type vulnerability in Agile Logix Store Locator WordPress allows Upload a Web Shell to a Web Server. This issue affects Store Locator WordPress: from n/a through 1.5.2.
AI Analysis
Technical Summary
CVE-2025-49329 is a vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This specific vulnerability affects the Agile Logix Store Locator plugin for WordPress, versions up to and including 1.5.2. The core issue is that the plugin does not properly restrict the types of files that can be uploaded by users, allowing an attacker with appropriate privileges to upload malicious files such as web shells. A web shell is a script that enables remote command execution on the web server, effectively granting an attacker control over the compromised system. The vulnerability requires the attacker to have some level of privileges (as indicated by the CVSS vector requiring privileges), but does not require user interaction. The vulnerability has a CVSS 3.1 base score of 6.6, indicating a medium severity level. The attack vector is network-based, with low attack complexity, and the scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality, integrity, and availability losses, as the attacker can execute arbitrary commands and potentially manipulate or disrupt the web server and its hosted data. No known exploits are reported in the wild as of the publication date, and no patches have been linked yet. This vulnerability is significant because WordPress is widely used across many organizations, and plugins like Store Locator are common for retail and service businesses to provide location information. The ability to upload a web shell can lead to full server compromise, data theft, defacement, or use of the server as a pivot point for further attacks.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress with the Agile Logix Store Locator plugin to manage store or branch locations. Successful exploitation could lead to unauthorized access to sensitive customer data, internal business information, or payment processing systems if hosted on the same infrastructure. The compromise of web servers can also lead to reputational damage, regulatory non-compliance (notably under GDPR), and potential financial losses due to downtime or remediation costs. Given the interconnected nature of European business ecosystems and the prevalence of WordPress, exploitation could also facilitate lateral movement within networks, increasing the scope of impact. Additionally, the medium severity score suggests that while exploitation requires some privilege, the consequences of a successful attack are significant enough to warrant urgent attention. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify if the Agile Logix Store Locator plugin is in use and confirm the version. If version 1.5.2 or earlier is present, it is critical to restrict or disable file upload functionalities until a patch or update is available. Implement strict file type validation on the server side, ensuring only safe file types are accepted. Employ web application firewalls (WAFs) with rules designed to detect and block web shell uploads and suspicious file activity. Limit user privileges to the minimum necessary to reduce the risk of privileged attackers exploiting this vulnerability. Regularly monitor server logs for unusual file uploads or execution patterns. Segregate web server environments from sensitive backend systems to contain potential breaches. Finally, maintain an active vulnerability management program to apply patches promptly once they are released by Agile Logix.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-49329: CWE-434 Unrestricted Upload of File with Dangerous Type in Agile Logix Store Locator WordPress
Description
Unrestricted Upload of File with Dangerous Type vulnerability in Agile Logix Store Locator WordPress allows Upload a Web Shell to a Web Server. This issue affects Store Locator WordPress: from n/a through 1.5.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-49329 is a vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This specific vulnerability affects the Agile Logix Store Locator plugin for WordPress, versions up to and including 1.5.2. The core issue is that the plugin does not properly restrict the types of files that can be uploaded by users, allowing an attacker with appropriate privileges to upload malicious files such as web shells. A web shell is a script that enables remote command execution on the web server, effectively granting an attacker control over the compromised system. The vulnerability requires the attacker to have some level of privileges (as indicated by the CVSS vector requiring privileges), but does not require user interaction. The vulnerability has a CVSS 3.1 base score of 6.6, indicating a medium severity level. The attack vector is network-based, with low attack complexity, and the scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality, integrity, and availability losses, as the attacker can execute arbitrary commands and potentially manipulate or disrupt the web server and its hosted data. No known exploits are reported in the wild as of the publication date, and no patches have been linked yet. This vulnerability is significant because WordPress is widely used across many organizations, and plugins like Store Locator are common for retail and service businesses to provide location information. The ability to upload a web shell can lead to full server compromise, data theft, defacement, or use of the server as a pivot point for further attacks.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress with the Agile Logix Store Locator plugin to manage store or branch locations. Successful exploitation could lead to unauthorized access to sensitive customer data, internal business information, or payment processing systems if hosted on the same infrastructure. The compromise of web servers can also lead to reputational damage, regulatory non-compliance (notably under GDPR), and potential financial losses due to downtime or remediation costs. Given the interconnected nature of European business ecosystems and the prevalence of WordPress, exploitation could also facilitate lateral movement within networks, increasing the scope of impact. Additionally, the medium severity score suggests that while exploitation requires some privilege, the consequences of a successful attack are significant enough to warrant urgent attention. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify if the Agile Logix Store Locator plugin is in use and confirm the version. If version 1.5.2 or earlier is present, it is critical to restrict or disable file upload functionalities until a patch or update is available. Implement strict file type validation on the server side, ensuring only safe file types are accepted. Employ web application firewalls (WAFs) with rules designed to detect and block web shell uploads and suspicious file activity. Limit user privileges to the minimum necessary to reduce the risk of privileged attackers exploiting this vulnerability. Regularly monitor server logs for unusual file uploads or execution patterns. Segregate web server environments from sensitive backend systems to contain potential breaches. Finally, maintain an active vulnerability management program to apply patches promptly once they are released by Agile Logix.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-04T09:42:17.747Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6842ede271f4d251b5c88183
Added to database: 6/6/2025, 1:32:18 PM
Last enriched: 7/7/2025, 7:43:19 PM
Last updated: 7/30/2025, 4:14:03 PM
Views: 9
Related Threats
CVE-2025-8336: SQL Injection in Campcodes Online Recruitment Management System
MediumCVE-2025-36040: CWE-613 Insufficient Session Expiration in IBM Aspera Faspex
MediumCVE-2025-36039: CWE-602 Client-Side Enforcement of Server-Side Security in IBM Aspera Faspex
MediumCVE-2025-8338: SQL Injection in projectworlds Online Admission System
MediumCVE-2025-49084: Vulnerability in Absolutee Security Secure Access
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.