Skip to main content

CVE-2025-49329: CWE-434 Unrestricted Upload of File with Dangerous Type in Agile Logix Store Locator WordPress

Medium
VulnerabilityCVE-2025-49329cvecve-2025-49329cwe-434
Published: Fri Jun 06 2025 (06/06/2025, 12:53:57 UTC)
Source: CVE Database V5
Vendor/Project: Agile Logix
Product: Store Locator WordPress

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Agile Logix Store Locator WordPress allows Upload a Web Shell to a Web Server. This issue affects Store Locator WordPress: from n/a through 1.5.2.

AI-Powered Analysis

AILast updated: 07/07/2025, 19:43:19 UTC

Technical Analysis

CVE-2025-49329 is a vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This specific vulnerability affects the Agile Logix Store Locator plugin for WordPress, versions up to and including 1.5.2. The core issue is that the plugin does not properly restrict the types of files that can be uploaded by users, allowing an attacker with appropriate privileges to upload malicious files such as web shells. A web shell is a script that enables remote command execution on the web server, effectively granting an attacker control over the compromised system. The vulnerability requires the attacker to have some level of privileges (as indicated by the CVSS vector requiring privileges), but does not require user interaction. The vulnerability has a CVSS 3.1 base score of 6.6, indicating a medium severity level. The attack vector is network-based, with low attack complexity, and the scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact includes limited confidentiality, integrity, and availability losses, as the attacker can execute arbitrary commands and potentially manipulate or disrupt the web server and its hosted data. No known exploits are reported in the wild as of the publication date, and no patches have been linked yet. This vulnerability is significant because WordPress is widely used across many organizations, and plugins like Store Locator are common for retail and service businesses to provide location information. The ability to upload a web shell can lead to full server compromise, data theft, defacement, or use of the server as a pivot point for further attacks.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress with the Agile Logix Store Locator plugin to manage store or branch locations. Successful exploitation could lead to unauthorized access to sensitive customer data, internal business information, or payment processing systems if hosted on the same infrastructure. The compromise of web servers can also lead to reputational damage, regulatory non-compliance (notably under GDPR), and potential financial losses due to downtime or remediation costs. Given the interconnected nature of European business ecosystems and the prevalence of WordPress, exploitation could also facilitate lateral movement within networks, increasing the scope of impact. Additionally, the medium severity score suggests that while exploitation requires some privilege, the consequences of a successful attack are significant enough to warrant urgent attention. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify if the Agile Logix Store Locator plugin is in use and confirm the version. If version 1.5.2 or earlier is present, it is critical to restrict or disable file upload functionalities until a patch or update is available. Implement strict file type validation on the server side, ensuring only safe file types are accepted. Employ web application firewalls (WAFs) with rules designed to detect and block web shell uploads and suspicious file activity. Limit user privileges to the minimum necessary to reduce the risk of privileged attackers exploiting this vulnerability. Regularly monitor server logs for unusual file uploads or execution patterns. Segregate web server environments from sensitive backend systems to contain potential breaches. Finally, maintain an active vulnerability management program to apply patches promptly once they are released by Agile Logix.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:17.747Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6842ede271f4d251b5c88183

Added to database: 6/6/2025, 1:32:18 PM

Last enriched: 7/7/2025, 7:43:19 PM

Last updated: 7/30/2025, 4:14:03 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats