Skip to main content

CVE-2025-6085: CWE-434 Unrestricted Upload of File with Dangerous Type in integromat Make Connector

High
VulnerabilityCVE-2025-6085cvecve-2025-6085cwe-434
Published: Thu Sep 04 2025 (09/04/2025, 09:22:24 UTC)
Source: CVE Database V5
Vendor/Project: integromat
Product: Make Connector

Description

The Make Connector plugin for WordPress is vulnerable to arbitrary file uploads due to misconfigured file type validation in the 'upload_media' function in all versions up to, and including, 1.5.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 09/04/2025, 10:19:02 UTC

Technical Analysis

CVE-2025-6085 is a high-severity vulnerability affecting the Make Connector plugin for WordPress, developed by integromat. The vulnerability arises from improper file type validation in the 'upload_media' function, which allows authenticated users with Administrator-level privileges or higher to upload arbitrary files to the web server. This is classified under CWE-434, indicating an unrestricted upload of files with dangerous types. Because the plugin fails to properly restrict or sanitize the types of files that can be uploaded, an attacker can upload malicious files such as web shells or scripts that could be executed remotely, leading to remote code execution (RCE). The vulnerability affects all versions up to and including 1.5.10. The CVSS v3.1 base score is 7.2, reflecting a high severity due to the network attack vector, low attack complexity, requirement for high privileges, no user interaction, and significant impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential for exploitation is significant given the nature of the vulnerability. Since the flaw requires administrator-level access, it presupposes that the attacker has already compromised or gained elevated privileges on the WordPress site, but once achieved, this vulnerability can be leveraged to escalate control over the server environment. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps by affected organizations.

Potential Impact

For European organizations, this vulnerability poses a serious risk, especially for those relying on WordPress sites with the Make Connector plugin installed. Successful exploitation could lead to full server compromise, data breaches involving sensitive customer or business data, defacement of websites, or use of the compromised server as a pivot point for further attacks within the corporate network. Given the high prevalence of WordPress in Europe for both commercial and governmental websites, the impact could extend to critical infrastructure, e-commerce platforms, and public sector portals. The breach of confidentiality and integrity could result in regulatory penalties under GDPR due to unauthorized data access or leakage. Additionally, availability could be disrupted if attackers deploy ransomware or destructive payloads. The requirement for administrator privileges limits the attack surface but also highlights the importance of internal security controls and monitoring to prevent privilege escalation or insider threats. Organizations with less mature security postures or those that do not regularly update and audit their WordPress plugins are at higher risk.

Mitigation Recommendations

1. Immediate review and restriction of administrator-level access to WordPress sites using the Make Connector plugin to ensure only trusted personnel have such privileges. 2. Implement strict file upload controls and validation at the web application firewall (WAF) or reverse proxy level to block dangerous file types and suspicious upload patterns. 3. Monitor logs for unusual file upload activity, especially uploads of executable or script files, and establish alerting mechanisms. 4. If possible, disable or remove the Make Connector plugin until a patch or update is released by the vendor. 5. Employ application-level security plugins that can detect and block malicious uploads or unauthorized file modifications. 6. Conduct regular security audits and vulnerability scans focusing on WordPress installations and plugins. 7. Harden the underlying server environment by restricting execution permissions in upload directories and employing least privilege principles for web server processes. 8. Maintain up-to-date backups and have an incident response plan ready in case of compromise. 9. Engage with the vendor or community to track the release of patches or updates addressing this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-13T22:50:49.868Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68b966f323d09a44244794b9

Added to database: 9/4/2025, 10:16:19 AM

Last enriched: 9/4/2025, 10:19:02 AM

Last updated: 9/4/2025, 10:23:09 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats