CVE-2025-13094
Published: 13 December 2025
Description
The WP3D Model Import Viewer plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_import_file() function in all versions up to, and including, 1.0.7. This makes it possible for authenticated attackers, with…
more
Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the missing file type validation in the handle_import_file() function by requiring checks on information inputs like uploaded files to prevent arbitrary uploads.
Enforces restrictions on file types, sizes, and other attributes at web application boundaries to block unrestricted uploads of dangerous files.
Mitigates the specific flaw in WP3D Model Import Viewer plugin versions up to 1.0.7 by identifying, testing, and installing timely patches or updates.
Security SummaryAI
CVE-2025-13094 is an arbitrary file upload vulnerability in the WP3D Model Import Viewer plugin for WordPress, affecting all versions up to and including 1.0.7. The issue arises from missing file type validation in the handle_import_file() function, allowing attackers to upload files without proper restrictions. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-434 (Unrestricted Upload of File with Dangerous Type). The vulnerability was published on 2025-12-13.
Authenticated attackers with Author-level access or higher can exploit this flaw over the network with low complexity and no user interaction required. By uploading arbitrary files to the affected site's server, they can potentially achieve remote code execution, granting high levels of confidentiality, integrity, and availability impact.
Advisories providing further details and mitigation guidance are available from the plugin's WordPress.org page at https://wordpress.org/plugins/wp3d-model-import-block/ and Wordfence threat intelligence at https://www.wordfence.com/threat-intel/vulnerabilities/id/3144f190-232c-40c0-9e4b-d1cedfe52b26?source=cve.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload in a public-facing WordPress plugin enables exploitation of public-facing applications (T1190) and facilitates deployment of web shells for RCE (T1505.003).