Skip to main content

CVE-2025-6058: CWE-434 Unrestricted Upload of File with Dangerous Type in iqonicdesign WPBookit

Critical
VulnerabilityCVE-2025-6058cvecve-2025-6058cwe-434
Published: Sat Jul 12 2025 (07/12/2025, 04:22:21 UTC)
Source: CVE Database V5
Vendor/Project: iqonicdesign
Product: WPBookit

Description

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 07/19/2025, 21:03:53 UTC

Technical Analysis

CVE-2025-6058 is a critical vulnerability identified in the WPBookit plugin for WordPress, developed by iqonicdesign. The vulnerability stems from improper validation of file types in the image_upload_handle() function, which is triggered via the 'add_booking_type' route. This flaw allows unauthenticated attackers to upload arbitrary files to the server hosting the affected WordPress site. Since the plugin fails to restrict or validate the types of files uploaded, attackers can potentially upload malicious scripts or executables. This can lead to remote code execution (RCE), enabling attackers to execute arbitrary code on the server, compromise the website, steal sensitive data, or pivot to other internal systems. The vulnerability affects all versions up to and including 1.0.4 of WPBookit. The CVSS v3.1 score is 9.8 (critical), reflecting the high impact and ease of exploitation (no authentication or user interaction required). Although no public exploits have been reported in the wild yet, the vulnerability's nature and severity make it a prime target for attackers. The CWE-434 classification highlights the core issue as unrestricted file upload of dangerous types, a common vector for web application compromise. Given the widespread use of WordPress and the popularity of booking plugins for service-oriented websites, this vulnerability poses a significant risk to affected sites.

Potential Impact

For European organizations, the impact of this vulnerability can be severe. Many businesses, including hotels, travel agencies, event organizers, and service providers, rely on WordPress plugins like WPBookit to manage bookings and customer interactions. Exploitation could lead to full server compromise, data breaches involving personal customer data (including GDPR-protected information), service disruption, and reputational damage. Attackers could use the vulnerability to deploy ransomware, steal payment information, or conduct further lateral attacks within corporate networks. The criticality of the vulnerability means that even small and medium enterprises using WPBookit are at risk, potentially affecting a broad range of sectors such as hospitality, tourism, and event management across Europe. Additionally, compromised websites could be used as launchpads for phishing campaigns or malware distribution, amplifying the threat landscape regionally.

Mitigation Recommendations

Immediate mitigation steps include updating the WPBookit plugin to a patched version once released by iqonicdesign. Until a patch is available, organizations should consider disabling the plugin or restricting access to the 'add_booking_type' route through web application firewalls (WAFs) or server-level access controls. Implementing strict file upload validation rules at the server or application level can help prevent malicious file types from being accepted. Monitoring web server logs for suspicious upload attempts and scanning for unauthorized files can aid early detection. Employing security plugins that detect and block malicious uploads and ensuring the WordPress core and all plugins/themes are regularly updated reduces overall risk. Organizations should also conduct thorough security audits and penetration testing focused on file upload functionalities. Finally, applying the principle of least privilege to the web server and plugin file system permissions can limit the impact of a successful exploit.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-13T12:58:43.616Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6871e88ea83201eaacb2c94c

Added to database: 7/12/2025, 4:46:06 AM

Last enriched: 7/19/2025, 9:03:53 PM

Last updated: 8/17/2025, 9:29:15 AM

Views: 36

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats