Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5058: CWE-434 Unrestricted Upload of File with Dangerous Type in emagicone eMagicOne Store Manager for WooCommerce

0
Critical
VulnerabilityCVE-2025-5058cvecve-2025-5058cwe-434
Published: Sat May 24 2025 (05/24/2025, 03:37:32 UTC)
Source: CVE
Vendor/Project: emagicone
Product: eMagicOne Store Manager for WooCommerce

Description

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_image() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. This is only exploitable by unauthenticated attackers in default configurations where the the default password is left as 1:1, or where the attacker gains access to the credentials.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:01:54 UTC

Technical Analysis

The eMagicOne Store Manager for WooCommerce plugin for WordPress suffers from an unrestricted file upload vulnerability (CWE-434) identified as CVE-2025-5058. The root cause lies in the set_image() function, which lacks proper validation of uploaded file types, allowing attackers to upload arbitrary files, including potentially malicious scripts. This vulnerability is exploitable without authentication only if the default password remains unchanged (username: 1, password: 1) or if attackers have obtained valid credentials through other means. Successful exploitation can lead to remote code execution on the affected server, enabling attackers to execute arbitrary commands, escalate privileges, and compromise the entire system. The vulnerability affects all plugin versions up to 1.2.5, with no patches currently available. The CVSS v3.1 base score is 9.8, reflecting the ease of exploitation (network vector, no privileges, no user interaction) and the critical impact on confidentiality, integrity, and availability. While no active exploits have been reported, the vulnerability poses a high risk to WooCommerce sites using this plugin, especially those with weak or default credentials.

Potential Impact

If exploited, this vulnerability can lead to complete compromise of affected WordPress sites running the eMagicOne Store Manager for WooCommerce plugin. Attackers can upload malicious files, such as web shells, enabling remote code execution, data theft, defacement, or pivoting to internal networks. The integrity of e-commerce data, including customer information and transaction records, can be severely impacted. Availability may also be disrupted through destructive payloads or denial-of-service conditions. Organizations relying on this plugin for online sales face reputational damage, financial loss, and regulatory compliance risks. The threat is amplified in environments where default credentials are not changed or where credential theft occurs, making the attack vector accessible to unauthenticated adversaries. Given WooCommerce's widespread use globally, the potential impact is broad and significant.

Mitigation Recommendations

1. Immediately change default credentials from the insecure '1:1' to strong, unique usernames and passwords to prevent unauthenticated exploitation. 2. Restrict access to the plugin's management interfaces using IP whitelisting or VPNs to reduce exposure. 3. Monitor web server logs for suspicious file upload attempts or unexpected file types in upload directories. 4. Implement Web Application Firewalls (WAFs) with rules to detect and block arbitrary file upload patterns targeting this plugin. 5. Disable or restrict file execution permissions in upload directories to limit the impact of malicious files. 6. Regularly audit installed plugins and remove unused or outdated ones. 7. Stay alert for official patches or updates from the vendor and apply them promptly once available. 8. Employ intrusion detection systems to identify anomalous activities related to file uploads or remote code execution attempts. 9. Educate administrators on the risks of default credentials and enforce credential management policies. 10. Consider isolating WordPress instances in containerized or sandboxed environments to limit lateral movement if compromised.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-21T14:42:07.720Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683142850acd01a249277dc4

Added to database: 5/24/2025, 3:52:37 AM

Last enriched: 2/27/2026, 3:01:54 PM

Last updated: 3/27/2026, 9:42:43 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses