CVE-2025-7437: CWE-434 Unrestricted Upload of File with Dangerous Type in motovnet Ebook Store
The Ebook Store plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ebook_store_save_form function in all versions up to, and including, 5.8012. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-7437 is a critical vulnerability affecting the Ebook Store plugin for WordPress developed by motovnet. The vulnerability arises from the lack of proper file type validation in the function ebook_store_save_form across all versions up to and including 5.8012. This flaw allows unauthenticated attackers to upload arbitrary files to the server hosting the affected WordPress site. Since the upload mechanism does not restrict dangerous file types, attackers can potentially upload malicious scripts or executable files. This can lead to remote code execution (RCE), enabling attackers to execute arbitrary code on the server, compromise the website, steal sensitive data, or pivot further into the hosting environment. The vulnerability is classified under CWE-434, which pertains to unrestricted file upload vulnerabilities. The CVSS v3.1 base score is 9.8, indicating a critical severity with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the ease of exploitation and the critical impact make this a high-risk vulnerability for any WordPress site using the affected plugin versions. Given WordPress's widespread use, this vulnerability poses a significant threat to websites relying on the Ebook Store plugin for digital content management and sales.
Potential Impact
For European organizations, this vulnerability presents a severe risk, especially for businesses operating e-commerce platforms, digital content providers, and any entity using WordPress with the Ebook Store plugin. Successful exploitation could lead to full server compromise, data breaches involving customer information, intellectual property theft, and disruption of online services. This could result in financial losses, reputational damage, and regulatory penalties under GDPR due to unauthorized access or data leakage. The ability for unauthenticated attackers to remotely execute code without user interaction increases the likelihood of automated exploitation campaigns targeting vulnerable sites. Additionally, compromised sites could be used as launchpads for further attacks within corporate networks or to distribute malware to customers and partners. The impact extends beyond individual organizations to the broader European digital ecosystem, potentially affecting trust in online commerce platforms.
Mitigation Recommendations
Immediate mitigation steps include: 1) Updating the Ebook Store plugin to a patched version once released by the vendor. Since no patch links are currently available, organizations should monitor vendor announcements closely. 2) Implementing web application firewall (WAF) rules to block or restrict file upload requests to the vulnerable endpoint, particularly filtering out executable or script file types. 3) Restricting file upload permissions on the server to prevent execution of uploaded files, such as disabling execution rights in upload directories. 4) Employing strict input validation and sanitization at the application level to enforce allowed file types and sizes. 5) Conducting regular security audits and scanning WordPress installations for unauthorized files or changes. 6) Isolating WordPress environments and limiting their access to critical backend systems to reduce lateral movement risk. 7) Educating site administrators about the risks of using outdated plugins and encouraging timely updates. These measures, combined, reduce the attack surface and limit the potential damage until an official patch is available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-7437: CWE-434 Unrestricted Upload of File with Dangerous Type in motovnet Ebook Store
Description
The Ebook Store plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ebook_store_save_form function in all versions up to, and including, 5.8012. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Technical Analysis
CVE-2025-7437 is a critical vulnerability affecting the Ebook Store plugin for WordPress developed by motovnet. The vulnerability arises from the lack of proper file type validation in the function ebook_store_save_form across all versions up to and including 5.8012. This flaw allows unauthenticated attackers to upload arbitrary files to the server hosting the affected WordPress site. Since the upload mechanism does not restrict dangerous file types, attackers can potentially upload malicious scripts or executable files. This can lead to remote code execution (RCE), enabling attackers to execute arbitrary code on the server, compromise the website, steal sensitive data, or pivot further into the hosting environment. The vulnerability is classified under CWE-434, which pertains to unrestricted file upload vulnerabilities. The CVSS v3.1 base score is 9.8, indicating a critical severity with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the ease of exploitation and the critical impact make this a high-risk vulnerability for any WordPress site using the affected plugin versions. Given WordPress's widespread use, this vulnerability poses a significant threat to websites relying on the Ebook Store plugin for digital content management and sales.
Potential Impact
For European organizations, this vulnerability presents a severe risk, especially for businesses operating e-commerce platforms, digital content providers, and any entity using WordPress with the Ebook Store plugin. Successful exploitation could lead to full server compromise, data breaches involving customer information, intellectual property theft, and disruption of online services. This could result in financial losses, reputational damage, and regulatory penalties under GDPR due to unauthorized access or data leakage. The ability for unauthenticated attackers to remotely execute code without user interaction increases the likelihood of automated exploitation campaigns targeting vulnerable sites. Additionally, compromised sites could be used as launchpads for further attacks within corporate networks or to distribute malware to customers and partners. The impact extends beyond individual organizations to the broader European digital ecosystem, potentially affecting trust in online commerce platforms.
Mitigation Recommendations
Immediate mitigation steps include: 1) Updating the Ebook Store plugin to a patched version once released by the vendor. Since no patch links are currently available, organizations should monitor vendor announcements closely. 2) Implementing web application firewall (WAF) rules to block or restrict file upload requests to the vulnerable endpoint, particularly filtering out executable or script file types. 3) Restricting file upload permissions on the server to prevent execution of uploaded files, such as disabling execution rights in upload directories. 4) Employing strict input validation and sanitization at the application level to enforce allowed file types and sizes. 5) Conducting regular security audits and scanning WordPress installations for unauthorized files or changes. 6) Isolating WordPress environments and limiting their access to critical backend systems to reduce lateral movement risk. 7) Educating site administrators about the risks of using outdated plugins and encouraging timely updates. These measures, combined, reduce the attack surface and limit the potential damage until an official patch is available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-10T16:51:50.723Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6881b76dad5a09ad00306acb
Added to database: 7/24/2025, 4:32:45 AM
Last enriched: 7/24/2025, 4:47:59 AM
Last updated: 8/15/2025, 3:41:47 AM
Views: 37
Related Threats
CVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
MediumCVE-2025-7499: CWE-862 Missing Authorization in wpdevteam BetterDocs – Advanced AI-Driven Documentation, FAQ & Knowledge Base Tool for Elementor & Gutenberg with Encyclopedia, AI Support, Instant Answers
MediumCVE-2025-8898: CWE-862 Missing Authorization in magepeopleteam E-cab Taxi Booking Manager for Woocommerce
CriticalCVE-2025-8896: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cozmoslabs User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor
MediumCVE-2025-8089: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mdempfle Advanced iFrame
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.