CVE-2025-10041
Published: 15 October 2025
Description
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Security Summary
CVE-2025-10041 is an arbitrary file upload vulnerability in the Flex QR Code Generator plugin for WordPress, affecting all versions up to and including 1.2.5. The flaw arises from missing file type validation in the save_qr_code_to_db() function, enabling attackers to place arbitrary files on the affected site's server. Classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges or user interaction required. By uploading malicious files, they gain the ability to potentially achieve remote code execution on the server, compromising confidentiality, integrity, and availability to a high degree.
Advisories and related resources, including Wordfence's threat intelligence report, the plugin's WordPress.org page, and Trac repository entries showing the vulnerable code at line 208 in version 1.2.5 and a corresponding changeset, provide details on the issue. Security practitioners should consult these for patch information and update guidance.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Arbitrary file upload in public-facing WordPress plugin directly enables T1190 (Exploit Public-Facing Application) and facilitates T1100 (Web Shell) via uploading executable files like PHP webshells for RCE.