Cyber Posture

CVE-2025-0357

Critical

Published: 25 January 2025

Published
25 January 2025
Modified
27 June 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0098 76.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Security Summary

CVE-2025-0357 is a critical vulnerability in the WPBookit plugin for WordPress, affecting versions up to and including 1.6.9. It stems from insufficient file type validation in the WPB_Profile_controller::handle_image_upload function, enabling arbitrary file uploads. This flaw, associated with CWE-434 (Unrestricted Upload of File with Dangerous Type), has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility and lack of prerequisites.

Unauthenticated attackers can exploit this vulnerability remotely without privileges or user interaction. By uploading arbitrary files to the affected WordPress site's server, they may achieve remote code execution, potentially compromising the entire server.

Advisories and patch information are available in the WPBookit change log at https://documentation.iqonic.design/wpbookit/versions/change-log and the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/19bf7a68-e76d-4740-9f35-b6084094f59b?source=cve, which detail mitigation steps and updates addressing the issue.

Details

CWE(s)
CWE-434

Affected Products

iqonic
wpbookit
≤ 1.6.10

References