Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5012: CWE-434 Unrestricted Upload of File with Dangerous Type in AmentoTech Workreap

0
High
VulnerabilityCVE-2025-5012cvecve-2025-5012cwe-434
Published: Thu Jun 12 2025 (06/12/2025, 05:23:39 UTC)
Source: CVE Database V5
Vendor/Project: AmentoTech
Product: Workreap

Description

The Workreap plugin for WordPress, used by the Workreap - Freelance Marketplace WordPress Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'workreap_temp_upload_to_media' function in all versions up to, and including, 3.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:59:55 UTC

Technical Analysis

CVE-2025-5012 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Workreap plugin for WordPress, specifically in the 'workreap_temp_upload_to_media' function. This function fails to properly validate the file types of uploads, allowing authenticated users with as low as Subscriber-level privileges to upload arbitrary files to the server. Because the plugin is widely used in the Workreap - Freelance Marketplace WordPress Theme, this vulnerability affects all versions up to and including 3.3.2. The absence of file type validation means attackers can upload malicious files, such as web shells or scripts, which can be executed remotely, leading to remote code execution (RCE). The CVSS 3.1 score of 8.8 reflects the vulnerability's high impact, with network attack vector, low attack complexity, privileges required at a low level, no user interaction needed, and full impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime target for attackers seeking to compromise WordPress sites running this plugin. The vulnerability is particularly dangerous because it allows attackers to bypass typical restrictions by leveraging authenticated access, which may be easier to obtain through phishing or credential stuffing. The plugin vendor has not yet provided a patch, so mitigation relies on other controls.

Potential Impact

The vulnerability enables attackers with minimal privileges (Subscriber-level) to upload arbitrary files, potentially leading to remote code execution on the affected web server. This can result in full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks. Organizations running the Workreap plugin on WordPress sites, especially those hosting freelance marketplaces or similar platforms, face risks including loss of sensitive user data, disruption of services, reputational damage, and regulatory penalties. Since WordPress powers a significant portion of the web, and Workreap targets freelance marketplace niches, the scope of affected systems is broad. The ease of exploitation without user interaction and the ability to escalate from low-privilege accounts exacerbate the threat. The vulnerability could also be leveraged to deploy malware, ransomware, or conduct further lateral movement within compromised networks.

Mitigation Recommendations

Immediate mitigation steps include restricting file upload permissions and disabling the vulnerable upload functionality if possible. Administrators should implement strict web application firewall (WAF) rules to detect and block suspicious file uploads targeting the vulnerable endpoint. Employing server-side file type validation and sanitization can help prevent malicious files from being accepted. Monitoring logs for unusual upload activity and scanning for web shells or unauthorized files is critical. Limiting user privileges to the minimum necessary and enforcing strong authentication mechanisms can reduce the risk of account compromise. Until an official patch is released, consider isolating the WordPress instance or running it in a hardened environment with minimal privileges. Regular backups and incident response plans should be in place to recover quickly if exploitation occurs. Organizations should track vendor updates closely and apply patches immediately once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-20T15:46:04.592Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684a67d6358c65714e6a146f

Added to database: 6/12/2025, 5:38:30 AM

Last enriched: 2/27/2026, 2:59:55 PM

Last updated: 3/22/2026, 2:48:35 AM

Views: 124

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses