Skip to main content

CVE-2025-8889: CWE-434 Unrestricted Upload of File with Dangerous Type in Compress & Upload

Medium
VulnerabilityCVE-2025-8889cvecve-2025-8889cwe-434
Published: Tue Sep 09 2025 (09/09/2025, 06:00:08 UTC)
Source: CVE Database V5
Product: Compress & Upload

Description

The Compress & Upload WordPress plugin before 1.0.5 does not properly validate uploaded files, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup)

AI-Powered Analysis

AILast updated: 09/09/2025, 19:41:52 UTC

Technical Analysis

CVE-2025-8889 is a vulnerability identified in the WordPress plugin 'Compress & Upload' versions prior to 1.0.5. The core issue relates to CWE-434, which involves the unrestricted upload of files with dangerous types. Specifically, the plugin fails to properly validate uploaded files, allowing users with high privileges—such as administrators—to upload arbitrary files to the server. This flaw is particularly critical in multisite WordPress setups, where the plugin's insufficient validation can be exploited to bypass intended restrictions on file uploads. Although the vulnerability requires high privilege users to exploit, the lack of proper file type validation means that malicious files (e.g., web shells, scripts) could be uploaded, potentially leading to unauthorized code execution or further compromise of the web server environment. The CVSS 3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). However, the description states that high privilege users are needed, which suggests some discrepancy in the CVSS vector PR:N. No known exploits are reported in the wild as of the publication date (September 9, 2025). No patches or fixes are linked yet, indicating that mitigation may require manual intervention or plugin updates once available.

Potential Impact

For European organizations running WordPress sites with the Compress & Upload plugin, especially those using multisite configurations, this vulnerability poses a moderate risk. If an attacker gains or already holds administrative privileges, they could upload malicious files, potentially leading to server-side code execution, data leakage, or further compromise of the hosting environment. This could result in defacement, data breaches, or pivoting attacks within the network. Given the widespread use of WordPress across Europe for business, governmental, and personal websites, exploitation could disrupt services or damage reputations. The impact is somewhat limited by the requirement for high privilege access, but insider threats or compromised admin accounts could facilitate exploitation. Additionally, multisite setups, common in larger organizations or managed hosting providers, increase the attack surface. The vulnerability does not directly affect availability, but indirect effects such as cleanup or incident response could cause downtime.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Compress & Upload plugin and verify the version in use. Until an official patch or update is released, administrators should restrict plugin usage to trusted personnel only and consider disabling or uninstalling the plugin if not essential. Implement strict access controls and multi-factor authentication (MFA) for all admin accounts to reduce the risk of privilege compromise. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious file uploads or execution attempts. Regularly monitor server logs for unusual file upload activity or unexpected file types. For multisite environments, review and tighten network and user permissions to limit the scope of potential exploitation. Once a patch is available, prioritize its deployment. Additionally, conduct security awareness training for administrators about the risks of arbitrary file uploads and the importance of plugin hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-08-12T12:28:16.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c082c41d20e9585176cde9

Added to database: 9/9/2025, 7:40:52 PM

Last enriched: 9/9/2025, 7:41:52 PM

Last updated: 9/9/2025, 7:41:52 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats