CVE-2025-5395: CWE-434 Unrestricted Upload of File with Dangerous Type in ValvePress WordPress Automatic Plugin
The WordPress Automatic Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'core.php' file in all versions up to, and including, 3.115.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-5395 is a critical vulnerability identified in the ValvePress WordPress Automatic Plugin, affecting all versions up to and including 3.115.0. The root cause is insufficient validation of uploaded file types in the 'core.php' file, categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type). Authenticated attackers with Author-level or higher privileges can exploit this flaw to upload arbitrary files to the web server hosting the WordPress site. Because the plugin fails to properly restrict or sanitize file types, attackers may upload malicious scripts or executables, potentially leading to remote code execution (RCE). The vulnerability is exploitable remotely over the network without requiring user interaction beyond authentication. The CVSS v3.1 base score is 8.8 (high), reflecting the ease of exploitation (low attack complexity), the requirement for privileges (Author-level), and the severe impact on confidentiality, integrity, and availability. While no public exploits are currently known, the vulnerability poses a significant risk to WordPress sites using this plugin, as attackers gaining Author-level access are not uncommon in compromised environments. The lack of available patches at the time of disclosure increases urgency for mitigation. This vulnerability highlights the critical need for strict file upload validation and privilege management in WordPress plugins.
Potential Impact
The impact of CVE-2025-5395 is substantial for organizations running WordPress sites with the ValvePress Automatic Plugin. Successful exploitation allows attackers to upload arbitrary files, including web shells or malicious scripts, enabling remote code execution on the server. This can lead to full site compromise, data theft, defacement, or use of the server as a pivot point for further network attacks. Confidentiality is at high risk as attackers can access sensitive data stored on the server. Integrity is compromised through unauthorized code execution and potential modification of website content or backend data. Availability may be affected if attackers disrupt services or deploy ransomware. Since exploitation requires only Author-level access, attackers who gain such privileges via phishing, credential reuse, or other vulnerabilities can leverage this flaw to escalate their control. The widespread use of WordPress globally means many sites could be affected, especially those that do not promptly update or monitor plugin security. The absence of known exploits currently provides a window for proactive defense, but the high severity score indicates a critical need for immediate action.
Mitigation Recommendations
1. Immediately restrict plugin upload permissions to the minimum necessary roles, ideally disabling file uploads for Author-level users until patched. 2. Monitor all file uploads for suspicious or executable file types using web application firewalls (WAFs) or security plugins that enforce strict MIME type and extension validation. 3. Implement file integrity monitoring to detect unauthorized changes or uploads on the server. 4. Apply principle of least privilege to WordPress user roles, ensuring only trusted users have Author-level or higher access. 5. Regularly audit user accounts and revoke unnecessary privileges to reduce attack surface. 6. Once available, promptly apply official patches or updates from ValvePress addressing this vulnerability. 7. Employ network segmentation and server hardening to limit the impact of potential compromise. 8. Use multi-factor authentication (MFA) for WordPress accounts to reduce risk of credential compromise. 9. Backup website data frequently and verify restoration procedures to mitigate ransomware or destructive attacks. 10. Stay informed through security advisories and threat intelligence feeds for any emerging exploit activity related to this CVE.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Brazil, Netherlands, Japan, Italy
CVE-2025-5395: CWE-434 Unrestricted Upload of File with Dangerous Type in ValvePress WordPress Automatic Plugin
Description
The WordPress Automatic Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'core.php' file in all versions up to, and including, 3.115.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-5395 is a critical vulnerability identified in the ValvePress WordPress Automatic Plugin, affecting all versions up to and including 3.115.0. The root cause is insufficient validation of uploaded file types in the 'core.php' file, categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type). Authenticated attackers with Author-level or higher privileges can exploit this flaw to upload arbitrary files to the web server hosting the WordPress site. Because the plugin fails to properly restrict or sanitize file types, attackers may upload malicious scripts or executables, potentially leading to remote code execution (RCE). The vulnerability is exploitable remotely over the network without requiring user interaction beyond authentication. The CVSS v3.1 base score is 8.8 (high), reflecting the ease of exploitation (low attack complexity), the requirement for privileges (Author-level), and the severe impact on confidentiality, integrity, and availability. While no public exploits are currently known, the vulnerability poses a significant risk to WordPress sites using this plugin, as attackers gaining Author-level access are not uncommon in compromised environments. The lack of available patches at the time of disclosure increases urgency for mitigation. This vulnerability highlights the critical need for strict file upload validation and privilege management in WordPress plugins.
Potential Impact
The impact of CVE-2025-5395 is substantial for organizations running WordPress sites with the ValvePress Automatic Plugin. Successful exploitation allows attackers to upload arbitrary files, including web shells or malicious scripts, enabling remote code execution on the server. This can lead to full site compromise, data theft, defacement, or use of the server as a pivot point for further network attacks. Confidentiality is at high risk as attackers can access sensitive data stored on the server. Integrity is compromised through unauthorized code execution and potential modification of website content or backend data. Availability may be affected if attackers disrupt services or deploy ransomware. Since exploitation requires only Author-level access, attackers who gain such privileges via phishing, credential reuse, or other vulnerabilities can leverage this flaw to escalate their control. The widespread use of WordPress globally means many sites could be affected, especially those that do not promptly update or monitor plugin security. The absence of known exploits currently provides a window for proactive defense, but the high severity score indicates a critical need for immediate action.
Mitigation Recommendations
1. Immediately restrict plugin upload permissions to the minimum necessary roles, ideally disabling file uploads for Author-level users until patched. 2. Monitor all file uploads for suspicious or executable file types using web application firewalls (WAFs) or security plugins that enforce strict MIME type and extension validation. 3. Implement file integrity monitoring to detect unauthorized changes or uploads on the server. 4. Apply principle of least privilege to WordPress user roles, ensuring only trusted users have Author-level or higher access. 5. Regularly audit user accounts and revoke unnecessary privileges to reduce attack surface. 6. Once available, promptly apply official patches or updates from ValvePress addressing this vulnerability. 7. Employ network segmentation and server hardening to limit the impact of potential compromise. 8. Use multi-factor authentication (MFA) for WordPress accounts to reduce risk of credential compromise. 9. Backup website data frequently and verify restoration procedures to mitigate ransomware or destructive attacks. 10. Stay informed through security advisories and threat intelligence feeds for any emerging exploit activity related to this CVE.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-30T16:08:21.847Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 684929083cd93dcca832a588
Added to database: 6/11/2025, 6:58:16 AM
Last enriched: 2/27/2026, 3:17:09 PM
Last updated: 3/21/2026, 5:45:16 AM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.