CVE-2019-25296
Published: 08 January 2026
Description
The WP Cost Estimation plugin for WordPress is vulnerable to arbitrary file uploads and deletion due to missing file type validation in the lfb_upload_form and lfb_removeFile AJAX actions in versions up to, and including, 9.642. This makes it possible for…
more
unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible. Additionally, the attacker can also delete files on the server such as database configuration files, subsequently uploading their own database files.
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of file types and contents in AJAX upload endpoints like lfb_upload_form, directly addressing the missing file type validation that enables arbitrary file uploads.
Enforces authorized access to file upload and deletion functions in AJAX actions like lfb_upload_form and lfb_removeFile, preventing unauthenticated exploitation.
Mandates timely remediation of the known flaw in the WP Cost Estimation plugin versions up to 9.642 through patching, eliminating the arbitrary file upload and deletion vulnerabilities.
Security SummaryAI
The WP Cost Estimation plugin for WordPress is vulnerable to arbitrary file uploads and deletion due to missing file type validation in the lfb_upload_form and lfb_removeFile AJAX actions in versions up to, and including, 9.642.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges required, as indicated by its CVSS 3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation allows attackers to upload arbitrary files to the affected site's server, potentially enabling remote code execution, as well as delete files such as database configuration files and subsequently upload their own database files.
Advisories from WPScan, Acunetix, and Wordfence detail the issues and note that vulnerabilities in the plugin have been patched, with Wordfence publishing mitigation guidance in early 2019.
Reports indicate real-world exploitation of this WordPress commercial plugin in the wild.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated arbitrary file upload enables exploitation of public-facing application (T1190) and deployment of web shells for RCE (T1505.003); arbitrary file deletion facilitates indicator removal (T1070.004).