Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6058: CWE-434 Unrestricted Upload of File with Dangerous Type in iqonicdesign WPBookit

0
Critical
VulnerabilityCVE-2025-6058cvecve-2025-6058cwe-434
Published: Sat Jul 12 2025 (07/12/2025, 04:22:21 UTC)
Source: CVE Database V5
Vendor/Project: iqonicdesign
Product: WPBookit

Description

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:59:49 UTC

Technical Analysis

CVE-2025-6058 is a critical security vulnerability identified in the WPBookit plugin for WordPress, developed by iqonicdesign. The flaw stems from the absence of proper file type validation in the image_upload_handle() function, which is invoked via the 'add_booking_type' route. This deficiency allows unauthenticated attackers to upload arbitrary files, including potentially malicious scripts, to the server hosting the affected WordPress site. Since the plugin does not restrict the types of files uploaded, attackers can leverage this to execute remote code, compromising the server's confidentiality, integrity, and availability. The vulnerability affects all versions of WPBookit up to and including version 1.0.4. The CVSS v3.1 base score is 9.8, reflecting its critical severity with attack vector being network-based, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. Although no patches have been released yet, the vulnerability is publicly disclosed and assigned by Wordfence. The lack of authentication requirements and the ease of exploitation make this a highly dangerous threat for WordPress sites using this plugin. Given WordPress's extensive use globally, the vulnerability poses a significant risk to a broad range of organizations, especially those relying on WPBookit for booking functionalities.

Potential Impact

The impact of CVE-2025-6058 is severe for organizations worldwide using the WPBookit plugin. Successful exploitation allows attackers to upload arbitrary files, which can lead to remote code execution on the web server. This can result in full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks within an organization's network. The vulnerability affects confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by potentially causing service disruptions or denial of service. Since the exploit requires no authentication or user interaction, the attack surface is broad, increasing the likelihood of automated exploitation attempts. Organizations running WordPress sites with this plugin, especially those handling sensitive customer data or critical business functions, face significant operational and reputational risks. Additionally, compromised servers could be enlisted in botnets or used to distribute malware, amplifying the threat beyond the initial target.

Mitigation Recommendations

To mitigate CVE-2025-6058, organizations should immediately audit their WordPress installations for the presence of the WPBookit plugin and its version. If the plugin is installed, disable or remove it until a security patch is released by iqonicdesign. In the absence of an official patch, implement web application firewall (WAF) rules to block or filter suspicious file upload attempts targeting the 'add_booking_type' route. Restrict file upload permissions on the server to prevent execution of uploaded files and isolate the upload directory from the web root if possible. Monitor server logs for unusual upload activity or access patterns. Additionally, enforce strict file type validation and scanning at the application or server level as a temporary control. Regularly back up website data and maintain an incident response plan to quickly address any compromise. Engage with the plugin vendor for updates and apply patches promptly once available. Consider alternative booking plugins with a stronger security track record if immediate patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-13T12:58:43.616Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6871e88ea83201eaacb2c94c

Added to database: 7/12/2025, 4:46:06 AM

Last enriched: 2/27/2026, 3:59:49 PM

Last updated: 3/25/2026, 7:09:15 PM

Views: 183

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses