Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6586: CWE-434 Unrestricted Upload of File with Dangerous Type in metagauss Download Plugin

0
High
VulnerabilityCVE-2025-6586cvecve-2025-6586cwe-434
Published: Fri Jul 04 2025 (07/04/2025, 01:44:03 UTC)
Source: CVE Database V5
Vendor/Project: metagauss
Product: Download Plugin

Description

The Download Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the dpwap_plugin_locInstall function in all versions up to, and including, 2.2.8. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:41:29 UTC

Technical Analysis

The vulnerability identified as CVE-2025-6586 affects the Download Plugin by metagauss for WordPress, specifically versions up to and including 2.2.8. The root cause is the absence of file type validation in the dpwap_plugin_locInstall function, which handles file uploads. This weakness allows an attacker with Administrator-level access to upload arbitrary files, including potentially malicious scripts, to the web server hosting the WordPress site. Because the attacker can upload files without restrictions on their type, they can place executable code on the server, leading to remote code execution (RCE). The vulnerability is classified under CWE-434, which pertains to unrestricted file upload vulnerabilities. The CVSS v3.1 base score is 7.2, indicating a high severity level, with the vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network with low attack complexity, requires high privileges (Administrator), no user interaction, and impacts confidentiality, integrity, and availability significantly. Although no known exploits are currently in the wild, the potential for exploitation is substantial given the nature of the vulnerability and the widespread use of WordPress and its plugins. The vulnerability affects all versions of the plugin up to 2.2.8, and no official patches have been linked yet, indicating the need for immediate attention by site administrators.

Potential Impact

If exploited, this vulnerability allows attackers with Administrator access to upload arbitrary files, including web shells or other malicious payloads, enabling full remote code execution on the affected server. This can lead to complete compromise of the website and underlying server infrastructure, data theft, defacement, malware distribution, and use of the server as a pivot point for further attacks within an organization's network. The confidentiality of sensitive data stored or processed by the website can be breached, integrity of website content and backend systems compromised, and availability disrupted through destructive payloads or denial-of-service conditions. Given WordPress's popularity, many organizations worldwide could be impacted, especially those relying on this plugin for file downloads. The requirement for Administrator privileges limits exploitation to insiders or attackers who have already compromised an admin account, but such privilege escalation is common in targeted attacks. The lack of public exploits currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability is public.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the metagauss Download Plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. Restrict Administrator access strictly to trusted personnel and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious file upload attempts targeting this plugin's endpoints. Monitor server logs for unusual file upload activity or the presence of unexpected files, especially executable scripts in upload directories. Regularly back up website data and server configurations to enable recovery in case of compromise. Once a patch becomes available, apply it promptly. Additionally, consider employing file integrity monitoring solutions to detect unauthorized changes to web server files. Educate administrators about the risks of arbitrary file uploads and the importance of least privilege principles.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-24T20:40:49.337Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68673b5e6f40f0eb729e5fb2

Added to database: 7/4/2025, 2:24:30 AM

Last enriched: 2/26/2026, 3:41:29 PM

Last updated: 3/24/2026, 2:02:11 PM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses