Cyber Posture

CVE-2019-25296

Critical

Published: 08 January 2026

Published
08 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0031 54.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The WP Cost Estimation plugin for WordPress is vulnerable to arbitrary file uploads and deletion due to missing file type validation in the lfb_upload_form and lfb_removeFile AJAX actions in versions up to, and including, 9.642. This makes it possible for…

more

unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible. Additionally, the attacker can also delete files on the server such as database configuration files, subsequently uploading their own database files.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of file types and contents in AJAX upload endpoints like lfb_upload_form, directly addressing the missing file type validation that enables arbitrary file uploads.

prevent

Enforces authorized access to file upload and deletion functions in AJAX actions like lfb_upload_form and lfb_removeFile, preventing unauthenticated exploitation.

prevent

Mandates timely remediation of the known flaw in the WP Cost Estimation plugin versions up to 9.642 through patching, eliminating the arbitrary file upload and deletion vulnerabilities.

Security SummaryAI

The WP Cost Estimation plugin for WordPress is vulnerable to arbitrary file uploads and deletion due to missing file type validation in the lfb_upload_form and lfb_removeFile AJAX actions in versions up to, and including, 9.642.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges required, as indicated by its CVSS 3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation allows attackers to upload arbitrary files to the affected site's server, potentially enabling remote code execution, as well as delete files such as database configuration files and subsequently upload their own database files.

Advisories from WPScan, Acunetix, and Wordfence detail the issues and note that vulnerabilities in the plugin have been patched, with Wordfence publishing mitigation guidance in early 2019.

Reports indicate real-world exploitation of this WordPress commercial plugin in the wild.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

Unauthenticated arbitrary file upload enables exploitation of public-facing application (T1190) and deployment of web shells for RCE (T1505.003); arbitrary file deletion facilitates indicator removal (T1070.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References