Skip to main content

CVE-2025-9216: CWE-434 Unrestricted Upload of File with Dangerous Type in kodezen StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More

High
VulnerabilityCVE-2025-9216cvecve-2025-9216cwe-434
Published: Wed Sep 17 2025 (09/17/2025, 06:17:48 UTC)
Source: CVE Database V5
Vendor/Project: kodezen
Product: StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More

Description

The StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the import() function in all versions up to, and including, 1.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 09/17/2025, 12:59:22 UTC

Technical Analysis

CVE-2025-9216 is a critical vulnerability identified in the StoreEngine WordPress plugin developed by kodezen, which is used for eCommerce functionalities including payments, memberships, affiliates, and sales management. The vulnerability arises from improper file type validation in the import() function present in all versions up to and including 1.5.0. Specifically, the plugin fails to restrict the types of files that authenticated users with Subscriber-level access or higher can upload. This lack of validation allows an attacker to upload arbitrary files, including potentially malicious scripts, to the web server hosting the WordPress site. Once uploaded, these files could be executed remotely, leading to remote code execution (RCE). The CVSS v3.1 base score of 8.8 reflects the high severity of this vulnerability, highlighting its network exploitability (AV:N), low attack complexity (AC:L), requirement for low privileges (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability is categorized under CWE-434, which concerns unrestricted file upload vulnerabilities that can lead to serious security breaches. Although no known exploits are currently reported in the wild, the ease of exploitation and the potential for severe consequences make this a significant threat. The absence of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation and monitoring. Given the widespread use of WordPress and the popularity of eCommerce plugins, this vulnerability could be leveraged to compromise websites, steal sensitive customer data, manipulate sales or membership information, or disrupt service availability through malicious payload execution.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial. Many European businesses rely on WordPress-based eCommerce platforms to manage online sales, memberships, and affiliate programs. Exploitation could lead to unauthorized access to sensitive customer data, including payment information, which would violate GDPR regulations and result in significant legal and financial penalties. The ability to execute arbitrary code on the server could also allow attackers to implant backdoors, deface websites, or launch further attacks within the organization's network. This could damage brand reputation, erode customer trust, and cause operational downtime. Additionally, the disruption of eCommerce services could lead to direct revenue loss. Given the high severity and ease of exploitation, European organizations using the StoreEngine plugin are at risk of targeted attacks, especially those with lower-tier user accounts that could be compromised or misused by insiders or external attackers. The threat also extends to the broader WordPress ecosystem, as compromised sites can be used as launchpads for attacks against partners or customers.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit their WordPress installations to identify the presence of the StoreEngine plugin and verify the version in use. If the plugin is installed, restrict user roles and permissions to the minimum necessary, especially limiting Subscriber-level users from uploading files until a patch is available. Implement web application firewalls (WAFs) with rules to detect and block suspicious file upload attempts and monitor for unusual file types or upload patterns. Employ file integrity monitoring to detect unauthorized changes or uploads on the server. Organizations should also consider disabling the import() functionality if feasible or replacing the plugin with a more secure alternative. Regularly update all WordPress plugins and core installations as patches become available. Conduct security awareness training for administrators and users to recognize and report suspicious activity. Finally, implement network segmentation and least privilege principles to limit the impact of a potential compromise and prepare incident response plans specifically addressing web application compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-19T20:08:21.967Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cab09db62c8e2e63b24695

Added to database: 9/17/2025, 12:59:09 PM

Last enriched: 9/17/2025, 12:59:22 PM

Last updated: 9/17/2025, 12:59:22 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats