Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64374: Unrestricted Upload of File with Dangerous Type in StylemixThemes Motors

0
Critical
VulnerabilityCVE-2025-64374cvecve-2025-64374
Published: Thu Dec 18 2025 (12/18/2025, 07:22:16 UTC)
Source: CVE Database V5
Vendor/Project: StylemixThemes
Product: Motors

Description

Unrestricted Upload of File with Dangerous Type vulnerability in StylemixThemes Motors motors allows Using Malicious Files.This issue affects Motors: from n/a through <= 5.6.81.

AI-Powered Analysis

AILast updated: 12/18/2025, 08:01:51 UTC

Technical Analysis

The vulnerability identified as CVE-2025-64374 affects the StylemixThemes Motors WordPress theme, specifically versions up to 5.6.81. It is characterized as an 'Unrestricted Upload of File with Dangerous Type' vulnerability, meaning the theme does not properly restrict or validate the types of files users can upload. This lack of restriction allows attackers to upload malicious files, such as web shells or scripts, which can be executed on the server. The consequence of such an exploit can range from website defacement and data theft to full remote code execution, enabling attackers to take control of the hosting environment. The vulnerability was reserved in late October 2025 and published in December 2025, with no CVSS score assigned and no known exploits in the wild at the time of publication. The absence of patches or official fixes suggests that users must rely on manual mitigation strategies until an update is released. The vulnerability is particularly critical in environments where user-uploaded content is common, such as automotive listings or classified ads websites, which are typical use cases for the Motors theme. Attackers exploiting this vulnerability do not require authentication or user interaction, increasing the risk profile. The unrestricted upload vector is a common and dangerous attack surface in web applications, often leading to severe security breaches if not properly managed.

Potential Impact

For European organizations, the impact of CVE-2025-64374 can be significant. Many businesses in Europe use WordPress themes like Motors for automotive marketplaces, classifieds, and dealer websites. Successful exploitation could lead to unauthorized server access, data breaches involving customer or business data, defacement of public-facing websites, and potential lateral movement within corporate networks. This could damage brand reputation, result in regulatory penalties under GDPR due to data exposure, and cause operational disruptions. The automotive sector is a critical industry in Europe, and compromised websites could also be used to distribute malware or phishing campaigns targeting customers. The lack of authentication or user interaction requirements makes this vulnerability easier to exploit remotely, increasing the threat level. Organizations with limited web security expertise or outdated themes are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation, but the risk of future exploitation remains high.

Mitigation Recommendations

To mitigate CVE-2025-64374, European organizations should immediately implement strict file upload restrictions on their WordPress installations using the Motors theme. This includes configuring the web server and WordPress to accept only safe file types (e.g., images like JPG, PNG) and reject executable or script files (e.g., PHP, JS, HTML). Employing a Web Application Firewall (WAF) with rules to detect and block malicious file uploads can provide an additional layer of defense. Administrators should monitor upload directories for suspicious files and regularly audit logs for unusual activity. Until an official patch is released by StylemixThemes, consider temporarily disabling file upload features if feasible. Keeping WordPress core, themes, and plugins updated is essential to reduce exposure to other vulnerabilities. Implementing the principle of least privilege for file system permissions can limit the impact of any successful upload. Finally, educating site administrators about secure configuration and monitoring is critical to maintaining ongoing security.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:23:19.708Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b0544eb3efac36700ae2

Added to database: 12/18/2025, 7:42:12 AM

Last enriched: 12/18/2025, 8:01:51 AM

Last updated: 12/19/2025, 8:46:19 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats