CVE-2025-9216: CWE-434 Unrestricted Upload of File with Dangerous Type in kodezen StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More
The StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the import() function in all versions up to, and including, 1.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-9216 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the StoreEngine plugin for WordPress, which is widely used for eCommerce functionalities including payments, memberships, affiliates, and sales. The root cause is the absence of proper file type validation in the import() function, allowing authenticated users with minimal privileges (Subscriber-level or above) to upload arbitrary files to the web server. Since the plugin does not restrict or sanitize the file types uploaded, attackers can upload malicious scripts or web shells, potentially leading to remote code execution (RCE). The vulnerability is remotely exploitable over the network without user interaction, increasing its risk profile. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and only low privileges required. This vulnerability affects all versions up to 1.5.0, and no official patches have been linked yet. Although no active exploitation has been reported, the ease of exploitation and potential for full server compromise make this a critical threat for WordPress sites using this plugin.
Potential Impact
The impact of CVE-2025-9216 is significant for organizations running WordPress sites with the StoreEngine plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands, install malware, steal sensitive data, or pivot within the network. This compromises the confidentiality, integrity, and availability of the affected systems. E-commerce sites are particularly at risk due to the potential theft of payment and customer data, disruption of sales operations, and damage to brand reputation. Since the vulnerability requires only Subscriber-level access, attackers can exploit compromised or weak user accounts, increasing the attack surface. The lack of user interaction and network-level exploitability means attackers can automate attacks at scale, potentially affecting many sites globally. The absence of known exploits in the wild currently provides a window for mitigation before widespread attacks occur.
Mitigation Recommendations
To mitigate CVE-2025-9216, organizations should immediately upgrade the StoreEngine plugin to a patched version once available. In the interim, administrators should restrict file upload capabilities to trusted users only and implement server-side file type validation and sanitization to prevent dangerous file types from being uploaded. Employing Web Application Firewalls (WAFs) with rules to detect and block suspicious file uploads can reduce risk. Regularly audit user roles and permissions to minimize the number of users with upload privileges, especially limiting Subscriber-level users from accessing import functionality if possible. Monitoring web server logs for unusual file uploads or execution attempts can provide early detection. Additionally, isolating WordPress instances and running them with least privilege can limit the impact of a successful exploit. Backup critical data and test restoration procedures to ensure recovery from potential compromises.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-9216: CWE-434 Unrestricted Upload of File with Dangerous Type in kodezen StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More
Description
The StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the import() function in all versions up to, and including, 1.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9216 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the StoreEngine plugin for WordPress, which is widely used for eCommerce functionalities including payments, memberships, affiliates, and sales. The root cause is the absence of proper file type validation in the import() function, allowing authenticated users with minimal privileges (Subscriber-level or above) to upload arbitrary files to the web server. Since the plugin does not restrict or sanitize the file types uploaded, attackers can upload malicious scripts or web shells, potentially leading to remote code execution (RCE). The vulnerability is remotely exploitable over the network without user interaction, increasing its risk profile. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and only low privileges required. This vulnerability affects all versions up to 1.5.0, and no official patches have been linked yet. Although no active exploitation has been reported, the ease of exploitation and potential for full server compromise make this a critical threat for WordPress sites using this plugin.
Potential Impact
The impact of CVE-2025-9216 is significant for organizations running WordPress sites with the StoreEngine plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands, install malware, steal sensitive data, or pivot within the network. This compromises the confidentiality, integrity, and availability of the affected systems. E-commerce sites are particularly at risk due to the potential theft of payment and customer data, disruption of sales operations, and damage to brand reputation. Since the vulnerability requires only Subscriber-level access, attackers can exploit compromised or weak user accounts, increasing the attack surface. The lack of user interaction and network-level exploitability means attackers can automate attacks at scale, potentially affecting many sites globally. The absence of known exploits in the wild currently provides a window for mitigation before widespread attacks occur.
Mitigation Recommendations
To mitigate CVE-2025-9216, organizations should immediately upgrade the StoreEngine plugin to a patched version once available. In the interim, administrators should restrict file upload capabilities to trusted users only and implement server-side file type validation and sanitization to prevent dangerous file types from being uploaded. Employing Web Application Firewalls (WAFs) with rules to detect and block suspicious file uploads can reduce risk. Regularly audit user roles and permissions to minimize the number of users with upload privileges, especially limiting Subscriber-level users from accessing import functionality if possible. Monitoring web server logs for unusual file uploads or execution attempts can provide early detection. Additionally, isolating WordPress instances and running them with least privilege can limit the impact of a successful exploit. Backup critical data and test restoration procedures to ensure recovery from potential compromises.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-19T20:08:21.967Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cab09db62c8e2e63b24695
Added to database: 9/17/2025, 12:59:09 PM
Last enriched: 2/26/2026, 5:47:11 PM
Last updated: 3/24/2026, 3:09:21 PM
Views: 140
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.