CVE-2025-9216: CWE-434 Unrestricted Upload of File with Dangerous Type in kodezen StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More
The StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the import() function in all versions up to, and including, 1.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-9216 is a critical vulnerability identified in the StoreEngine WordPress plugin developed by kodezen, which is used for eCommerce functionalities including payments, memberships, affiliates, and sales management. The vulnerability arises from improper file type validation in the import() function present in all versions up to and including 1.5.0. Specifically, the plugin fails to restrict the types of files that authenticated users with Subscriber-level access or higher can upload. This lack of validation allows an attacker to upload arbitrary files, including potentially malicious scripts, to the web server hosting the WordPress site. Once uploaded, these files could be executed remotely, leading to remote code execution (RCE). The CVSS v3.1 base score of 8.8 reflects the high severity of this vulnerability, highlighting its network exploitability (AV:N), low attack complexity (AC:L), requirement for low privileges (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is categorized under CWE-434, which concerns unrestricted file upload vulnerabilities that can lead to serious security breaches. Although no known exploits are currently reported in the wild, the ease of exploitation and the potential for severe consequences make this a significant threat. The absence of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation and monitoring. Given the widespread use of WordPress and the popularity of eCommerce plugins, this vulnerability could be leveraged to compromise websites, steal sensitive customer data, manipulate sales or membership information, or disrupt service availability through malicious payload execution.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial. Many European businesses rely on WordPress-based eCommerce platforms to manage online sales, memberships, and affiliate programs. Exploitation could lead to unauthorized access to sensitive customer data, including payment information, which would violate GDPR regulations and result in significant legal and financial penalties. The ability to execute arbitrary code on the server could also allow attackers to implant backdoors, deface websites, or launch further attacks within the organization's network. This could damage brand reputation, erode customer trust, and cause operational downtime. Additionally, the disruption of eCommerce services could lead to direct revenue loss. Given the high severity and ease of exploitation, European organizations using the StoreEngine plugin are at risk of targeted attacks, especially those with lower-tier user accounts that could be compromised or misused by insiders or external attackers. The threat also extends to the broader WordPress ecosystem, as compromised sites can be used as launchpads for attacks against partners or customers.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their WordPress installations to identify the presence of the StoreEngine plugin and verify the version in use. If the plugin is installed, restrict user roles and permissions to the minimum necessary, especially limiting Subscriber-level users from uploading files until a patch is available. Implement web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts and monitor for unusual file types or upload patterns. Employ file integrity monitoring to detect unauthorized changes or uploads on the server. Organizations should also consider disabling the import() functionality if feasible or replacing the plugin with a more secure alternative. Regularly update all WordPress plugins and core installations as patches become available. Conduct security awareness training for administrators and users to recognize and report suspicious activity. Finally, implement network segmentation and least privilege principles to limit the impact of a potential compromise and prepare incident response plans specifically addressing web application compromises.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9216: CWE-434 Unrestricted Upload of File with Dangerous Type in kodezen StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More
Description
The StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the import() function in all versions up to, and including, 1.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Technical Analysis
CVE-2025-9216 is a critical vulnerability identified in the StoreEngine WordPress plugin developed by kodezen, which is used for eCommerce functionalities including payments, memberships, affiliates, and sales management. The vulnerability arises from improper file type validation in the import() function present in all versions up to and including 1.5.0. Specifically, the plugin fails to restrict the types of files that authenticated users with Subscriber-level access or higher can upload. This lack of validation allows an attacker to upload arbitrary files, including potentially malicious scripts, to the web server hosting the WordPress site. Once uploaded, these files could be executed remotely, leading to remote code execution (RCE). The CVSS v3.1 base score of 8.8 reflects the high severity of this vulnerability, highlighting its network exploitability (AV:N), low attack complexity (AC:L), requirement for low privileges (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is categorized under CWE-434, which concerns unrestricted file upload vulnerabilities that can lead to serious security breaches. Although no known exploits are currently reported in the wild, the ease of exploitation and the potential for severe consequences make this a significant threat. The absence of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation and monitoring. Given the widespread use of WordPress and the popularity of eCommerce plugins, this vulnerability could be leveraged to compromise websites, steal sensitive customer data, manipulate sales or membership information, or disrupt service availability through malicious payload execution.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial. Many European businesses rely on WordPress-based eCommerce platforms to manage online sales, memberships, and affiliate programs. Exploitation could lead to unauthorized access to sensitive customer data, including payment information, which would violate GDPR regulations and result in significant legal and financial penalties. The ability to execute arbitrary code on the server could also allow attackers to implant backdoors, deface websites, or launch further attacks within the organization's network. This could damage brand reputation, erode customer trust, and cause operational downtime. Additionally, the disruption of eCommerce services could lead to direct revenue loss. Given the high severity and ease of exploitation, European organizations using the StoreEngine plugin are at risk of targeted attacks, especially those with lower-tier user accounts that could be compromised or misused by insiders or external attackers. The threat also extends to the broader WordPress ecosystem, as compromised sites can be used as launchpads for attacks against partners or customers.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately audit their WordPress installations to identify the presence of the StoreEngine plugin and verify the version in use. If the plugin is installed, restrict user roles and permissions to the minimum necessary, especially limiting Subscriber-level users from uploading files until a patch is available. Implement web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts and monitor for unusual file types or upload patterns. Employ file integrity monitoring to detect unauthorized changes or uploads on the server. Organizations should also consider disabling the import() functionality if feasible or replacing the plugin with a more secure alternative. Regularly update all WordPress plugins and core installations as patches become available. Conduct security awareness training for administrators and users to recognize and report suspicious activity. Finally, implement network segmentation and least privilege principles to limit the impact of a potential compromise and prepare incident response plans specifically addressing web application compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-19T20:08:21.967Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cab09db62c8e2e63b24695
Added to database: 9/17/2025, 12:59:09 PM
Last enriched: 9/17/2025, 12:59:22 PM
Last updated: 9/17/2025, 12:59:22 PM
Views: 2
Related Threats
CVE-2025-54390: n/a
HighCVE-2025-55904: n/a
MediumCVE-2025-10595: SQL Injection in SourceCodester Online Student File Management System
MediumCVE-2025-57055: n/a
HighCVE-2025-40933: CWE-340 Generation of Predictable Numbers or Identifiers in KGOLDOV Apache::AuthAny
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.