Skip to main content

CVE-2025-5395: CWE-434 Unrestricted Upload of File with Dangerous Type in ValvePress WordPress Automatic Plugin

High
VulnerabilityCVE-2025-5395cvecve-2025-5395cwe-434
Published: Wed Jun 11 2025 (06/11/2025, 06:39:46 UTC)
Source: CVE Database V5
Vendor/Project: ValvePress
Product: WordPress Automatic Plugin

Description

The WordPress Automatic Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'core.php' file in all versions up to, and including, 3.115.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 07/12/2025, 05:04:52 UTC

Technical Analysis

CVE-2025-5395 is a high-severity vulnerability affecting the ValvePress WordPress Automatic Plugin, versions up to and including 3.115.0. The vulnerability arises from insufficient validation of file types in the 'core.php' file, allowing authenticated users with Author-level privileges or higher to upload arbitrary files to the server hosting the WordPress site. This weakness is classified under CWE-434, which pertains to unrestricted file upload vulnerabilities. Because the plugin fails to properly restrict or sanitize the types of files that can be uploaded, an attacker can upload malicious files, such as web shells or scripts, potentially leading to remote code execution (RCE). The CVSS 3.1 base score of 8.8 reflects the critical nature of this flaw, with an attack vector over the network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is exploitable remotely by authenticated users with Author or higher roles, which are common in WordPress environments where multiple contributors or editors exist. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the widespread use of WordPress and the plugin's popularity. The vulnerability could allow attackers to gain full control over the affected web server, leading to data theft, site defacement, or pivoting to internal networks.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for businesses, media outlets, and e-commerce platforms relying on WordPress with the ValvePress Automatic Plugin. Exploitation could lead to unauthorized access to sensitive customer data, intellectual property, and internal systems, violating GDPR and other data protection regulations. The ability to execute arbitrary code remotely can result in website defacement, service disruption, or use of the compromised server as a launchpad for further attacks, including ransomware or supply chain compromises. Given the high prevalence of WordPress in Europe and the common use of plugins to automate content publishing, many organizations may be exposed. The breach of confidentiality and integrity could damage brand reputation and incur significant regulatory fines. Additionally, the attack vector requiring only Author-level access means that insider threats or compromised contributor accounts could be leveraged to exploit this vulnerability, increasing the risk profile for organizations with multiple content creators.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the ValvePress Automatic Plugin and verify the version in use. Until a patch is released, it is critical to restrict Author-level privileges to trusted users only and consider temporarily downgrading user roles or disabling the plugin if feasible. Implement strict monitoring of file upload directories for unauthorized or suspicious files and employ web application firewalls (WAFs) with custom rules to detect and block malicious upload attempts targeting this vulnerability. Organizations should also enforce multi-factor authentication (MFA) for all WordPress user accounts to reduce the risk of account compromise. Regular backups and incident response plans should be updated to prepare for potential exploitation. Once a patch is available, prompt application of the update is essential. Additionally, security teams should conduct penetration testing focused on file upload functionalities and review plugin configurations to ensure no other unrestricted upload paths exist.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-30T16:08:21.847Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684929083cd93dcca832a588

Added to database: 6/11/2025, 6:58:16 AM

Last enriched: 7/12/2025, 5:04:52 AM

Last updated: 8/4/2025, 2:40:56 AM

Views: 32

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats