Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9113: CWE-434 Unrestricted Upload of File with Dangerous Type in dreamstechnologies Doccure

0
Critical
VulnerabilityCVE-2025-9113cvecve-2025-9113cwe-434
Published: Mon Sep 08 2025 (09/08/2025, 18:23:47 UTC)
Source: CVE Database V5
Vendor/Project: dreamstechnologies
Product: Doccure

Description

The Doccure theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'doccure_temp_upload_to_media' function in all versions up to, and including, 1.4.8. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:39:57 UTC

Technical Analysis

CVE-2025-9113 is a critical security vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Doccure WordPress theme developed by dreamstechnologies. The flaw exists in the 'doccure_temp_upload_to_media' function, which fails to validate the type of files being uploaded. This lack of validation allows unauthenticated attackers to upload arbitrary files, including potentially malicious scripts, to the web server hosting the vulnerable WordPress site. Since the upload function does not restrict file types or require authentication, attackers can exploit this remotely without any user interaction. The uploaded files can be used to execute arbitrary code on the server, leading to full system compromise. The vulnerability affects all versions of the Doccure theme up to and including version 1.4.8. The CVSS v3.1 base score is 9.8, reflecting the critical nature of this vulnerability with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact covers confidentiality, integrity, and availability, making it a severe threat to affected systems. Although no exploits have been reported in the wild yet, the ease of exploitation and potential damage make this a high-priority issue for organizations using this theme. The absence of available patches at the time of publication increases the urgency for mitigation.

Potential Impact

The impact of CVE-2025-9113 is severe for organizations using the Doccure WordPress theme. Successful exploitation allows attackers to upload arbitrary files, including web shells or malware, enabling remote code execution. This can lead to complete server takeover, data theft, defacement, or use of the compromised server as a pivot point for further attacks within the network. Confidentiality is compromised as sensitive data stored or processed by the website can be accessed or exfiltrated. Integrity is at risk due to potential unauthorized modifications of website content or backend data. Availability can be disrupted by attackers deleting files, deploying ransomware, or causing service outages. Given that the vulnerability requires no authentication and no user interaction, attackers can automate exploitation at scale, increasing the risk of widespread compromise. Organizations relying on Doccure for healthcare or appointment booking services face additional reputational and compliance risks due to potential exposure of personal health information. The lack of patches at the time of disclosure further exacerbates the risk, necessitating immediate mitigation efforts.

Mitigation Recommendations

1. Immediately update the Doccure theme to a patched version once available from dreamstechnologies. Monitor vendor communications for official patches. 2. Until a patch is released, implement web application firewall (WAF) rules to block requests attempting to upload files to the vulnerable endpoint, especially those containing executable file extensions or suspicious payloads. 3. Restrict file upload permissions on the server to prevent execution of uploaded files, for example by disabling execution in upload directories via web server configuration (e.g., using .htaccess or nginx directives). 4. Employ strict input validation and file type checking at the web server or proxy level to block unauthorized file types. 5. Monitor server logs for unusual upload activity or access to suspicious files and conduct regular integrity checks on web directories. 6. Limit exposure by restricting access to the WordPress admin and upload endpoints through IP whitelisting or VPN access where feasible. 7. Regularly back up website data and configurations to enable recovery in case of compromise. 8. Educate site administrators about the risks and signs of exploitation to enable rapid detection and response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-18T09:04:28.460Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bf2103d5a2966cfc824dad

Added to database: 9/8/2025, 6:31:31 PM

Last enriched: 2/26/2026, 5:39:57 PM

Last updated: 3/27/2026, 8:46:57 AM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses