Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder

0
Critical
VulnerabilityCVE-2025-6679cvecve-2025-6679cwe-434
Published: Fri Aug 15 2025 (08/15/2025, 06:40:42 UTC)
Source: CVE Database V5
Vendor/Project: bitpressadmin
Product: Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder

Description

The Bit Form builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 2.20.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. For this to be exploitable, the PRO version needs to be installed and activated as well. Additionally a form with an advanced file upload element needs to be published.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:42:22 UTC

Technical Analysis

CVE-2025-6679 is a critical security vulnerability affecting the Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder WordPress plugin developed by bitpressadmin. The flaw stems from CWE-434, an unrestricted file upload vulnerability caused by the plugin's failure to validate file types during upload. This vulnerability exists in all versions up to and including 2.20.4. An unauthenticated attacker can exploit this by uploading arbitrary files to the server hosting the WordPress site, potentially leading to remote code execution (RCE). However, exploitation requires that the PRO version of the plugin is installed and activated, and that a form containing an advanced file upload element is published and accessible. The vulnerability has a CVSS v3.1 base score of 9.8, reflecting its critical nature, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the conditions for exploitation are straightforward, making this a high-risk vulnerability for affected WordPress sites. The lack of patch links suggests that a fix may not yet be publicly available, increasing urgency for mitigation. The vulnerability could allow attackers to upload malicious scripts or web shells, leading to full site compromise, data theft, defacement, or use of the server as a pivot point for further attacks.

Potential Impact

The impact of CVE-2025-6679 is severe for organizations using the Bit Form plugin with the PRO version and advanced file upload forms. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the web server. This compromises the confidentiality of sensitive data stored or processed by the website, undermines data integrity by enabling unauthorized modifications, and threatens availability through potential site defacement or denial of service. Organizations may face data breaches, loss of customer trust, regulatory penalties, and operational disruptions. Given WordPress's widespread use globally, many small to medium businesses, e-commerce sites, and enterprises relying on this plugin are at risk. The vulnerability's unauthenticated nature and lack of user interaction requirements make it highly exploitable, increasing the likelihood of automated attacks once exploit code becomes available. Additionally, attackers could leverage compromised servers to launch further attacks within internal networks or use them as part of botnets, amplifying the threat's scope.

Mitigation Recommendations

To mitigate CVE-2025-6679 effectively, organizations should take the following specific actions: 1) Immediately disable or remove any published forms that include the advanced file upload element in the Bit Form PRO plugin to prevent exploitation. 2) Restrict file upload permissions at the web server level, allowing only necessary file types and scanning uploads for malicious content using security tools or web application firewalls (WAFs). 3) Monitor web server logs and WordPress activity logs for unusual file upload attempts or execution of unexpected scripts. 4) If possible, isolate the WordPress environment in a sandbox or container to limit potential damage from exploitation. 5) Regularly back up website data and configurations to enable rapid recovery in case of compromise. 6) Stay alert for official patches or updates from the plugin vendor and apply them promptly once available. 7) Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block exploitation attempts. 8) Educate site administrators on the risks of enabling advanced upload features without proper validation and encourage minimal use of such features until patched. These steps go beyond generic advice by focusing on immediate risk reduction and proactive detection tailored to this specific vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-25T19:36:25.214Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689ed815ad5a09ad00637456

Added to database: 8/15/2025, 6:47:49 AM

Last enriched: 2/26/2026, 3:42:22 PM

Last updated: 3/25/2026, 3:14:44 PM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses