CVE-2025-66074: Unrestricted Upload of File with Dangerous Type in Cozmoslabs WP Webhooks
Unrestricted Upload of File with Dangerous Type vulnerability in Cozmoslabs WP Webhooks wp-webhooks allows Path Traversal.This issue affects WP Webhooks: from n/a through <= 3.3.8.
AI Analysis
Technical Summary
CVE-2025-66074 is a critical security vulnerability affecting the WP Webhooks plugin developed by Cozmoslabs for WordPress, specifically versions up to and including 3.3.8. The vulnerability is characterized by an unrestricted file upload flaw that allows attackers to upload files with dangerous types without proper validation or restriction. Additionally, the issue involves a path traversal vulnerability, which can be exploited to write files outside the intended directories, potentially overwriting critical files or placing malicious payloads in executable locations. The attack vector requires network access (AV:N), low attack complexity (AC:L), and low privileges (PR:L), but does require user interaction (UI:R), such as tricking a user with limited privileges to perform an action that triggers the upload. The vulnerability affects the confidentiality, integrity, and availability of the affected systems, as attackers can upload web shells or malware leading to remote code execution, data exfiltration, or site defacement. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the high CVSS score (9.0) reflects the criticality and potential impact. The vulnerability was reserved in November 2025 and published in December 2025, indicating recent discovery. The plugin is widely used in WordPress environments, which are common in many European organizations for websites and e-commerce platforms. The lack of available patches at the time of publication increases the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with the WP Webhooks plugin installed. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to gain persistent access, steal sensitive data, disrupt services, or deface websites. This is particularly critical for sectors such as government, finance, healthcare, and e-commerce, where data confidentiality and service availability are paramount. The path traversal aspect increases the risk by enabling attackers to place malicious files in sensitive directories, potentially compromising the entire web server or connected infrastructure. Given the widespread use of WordPress across Europe, organizations with limited patch management capabilities or those unaware of this plugin's presence are at heightened risk. The requirement for user interaction and low privilege means insider threats or social engineering attacks could facilitate exploitation. The impact extends beyond individual sites to potentially affect supply chains and customer trust, with regulatory implications under GDPR if personal data is compromised.
Mitigation Recommendations
1. Immediately identify and inventory all WordPress installations using the WP Webhooks plugin and verify the version in use. 2. Apply patches or updates from Cozmoslabs as soon as they become available; monitor vendor channels for official fixes. 3. In the absence of patches, implement strict file upload restrictions at the web server or application firewall level to block dangerous file types and suspicious payloads. 4. Employ input validation and sanitization on all webhook endpoints to prevent unauthorized file uploads and path traversal attempts. 5. Restrict user privileges to the minimum necessary, especially for roles that can trigger webhook actions or file uploads. 6. Monitor logs and network traffic for unusual upload activity or access patterns indicative of exploitation attempts. 7. Use web application firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting this vulnerability. 8. Educate users about phishing and social engineering risks that could lead to the required user interaction for exploitation. 9. Conduct regular security audits and penetration testing focused on webhook and file upload functionalities. 10. Consider isolating or sandboxing WordPress environments to limit the blast radius of potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-66074: Unrestricted Upload of File with Dangerous Type in Cozmoslabs WP Webhooks
Description
Unrestricted Upload of File with Dangerous Type vulnerability in Cozmoslabs WP Webhooks wp-webhooks allows Path Traversal.This issue affects WP Webhooks: from n/a through <= 3.3.8.
AI-Powered Analysis
Technical Analysis
CVE-2025-66074 is a critical security vulnerability affecting the WP Webhooks plugin developed by Cozmoslabs for WordPress, specifically versions up to and including 3.3.8. The vulnerability is characterized by an unrestricted file upload flaw that allows attackers to upload files with dangerous types without proper validation or restriction. Additionally, the issue involves a path traversal vulnerability, which can be exploited to write files outside the intended directories, potentially overwriting critical files or placing malicious payloads in executable locations. The attack vector requires network access (AV:N), low attack complexity (AC:L), and low privileges (PR:L), but does require user interaction (UI:R), such as tricking a user with limited privileges to perform an action that triggers the upload. The vulnerability affects the confidentiality, integrity, and availability of the affected systems, as attackers can upload web shells or malware leading to remote code execution, data exfiltration, or site defacement. The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the high CVSS score (9.0) reflects the criticality and potential impact. The vulnerability was reserved in November 2025 and published in December 2025, indicating recent discovery. The plugin is widely used in WordPress environments, which are common in many European organizations for websites and e-commerce platforms. The lack of available patches at the time of publication increases the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with the WP Webhooks plugin installed. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to gain persistent access, steal sensitive data, disrupt services, or deface websites. This is particularly critical for sectors such as government, finance, healthcare, and e-commerce, where data confidentiality and service availability are paramount. The path traversal aspect increases the risk by enabling attackers to place malicious files in sensitive directories, potentially compromising the entire web server or connected infrastructure. Given the widespread use of WordPress across Europe, organizations with limited patch management capabilities or those unaware of this plugin's presence are at heightened risk. The requirement for user interaction and low privilege means insider threats or social engineering attacks could facilitate exploitation. The impact extends beyond individual sites to potentially affect supply chains and customer trust, with regulatory implications under GDPR if personal data is compromised.
Mitigation Recommendations
1. Immediately identify and inventory all WordPress installations using the WP Webhooks plugin and verify the version in use. 2. Apply patches or updates from Cozmoslabs as soon as they become available; monitor vendor channels for official fixes. 3. In the absence of patches, implement strict file upload restrictions at the web server or application firewall level to block dangerous file types and suspicious payloads. 4. Employ input validation and sanitization on all webhook endpoints to prevent unauthorized file uploads and path traversal attempts. 5. Restrict user privileges to the minimum necessary, especially for roles that can trigger webhook actions or file uploads. 6. Monitor logs and network traffic for unusual upload activity or access patterns indicative of exploitation attempts. 7. Use web application firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting this vulnerability. 8. Educate users about phishing and social engineering risks that could lead to the required user interaction for exploitation. 9. Conduct regular security audits and penetration testing focused on webhook and file upload functionalities. 10. Consider isolating or sandboxing WordPress environments to limit the blast radius of potential compromises.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:20:58.862Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b0564eb3efac36700b44
Added to database: 12/18/2025, 7:42:14 AM
Last enriched: 1/21/2026, 12:21:33 AM
Last updated: 2/5/2026, 9:28:47 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1963: Improper Access Controls in WeKan
MediumCVE-2025-15551: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in TP-Link Systems Inc. Archer MR200 v5.2
MediumCVE-2026-1962: Improper Access Controls in WeKan
MediumCVE-2026-0106: Elevation of privilege in Google Android
CriticalCVE-2025-12131: CWE-20 Improper Input Validation in silabs.com Simplicity SDK
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.