Cyber Posture

CVE-2025-13094

High

Published: 13 December 2025

Published
13 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0046 64.0th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

The WP3D Model Import Viewer plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_import_file() function in all versions up to, and including, 1.0.7. This makes it possible for authenticated attackers, with…

more

Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the missing file type validation in the handle_import_file() function by requiring checks on information inputs like uploaded files to prevent arbitrary uploads.

prevent

Enforces restrictions on file types, sizes, and other attributes at web application boundaries to block unrestricted uploads of dangerous files.

prevent

Mitigates the specific flaw in WP3D Model Import Viewer plugin versions up to 1.0.7 by identifying, testing, and installing timely patches or updates.

Security SummaryAI

CVE-2025-13094 is an arbitrary file upload vulnerability in the WP3D Model Import Viewer plugin for WordPress, affecting all versions up to and including 1.0.7. The issue arises from missing file type validation in the handle_import_file() function, allowing attackers to upload files without proper restrictions. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-434 (Unrestricted Upload of File with Dangerous Type). The vulnerability was published on 2025-12-13.

Authenticated attackers with Author-level access or higher can exploit this flaw over the network with low complexity and no user interaction required. By uploading arbitrary files to the affected site's server, they can potentially achieve remote code execution, granting high levels of confidentiality, integrity, and availability impact.

Advisories providing further details and mitigation guidance are available from the plugin's WordPress.org page at https://wordpress.org/plugins/wp3d-model-import-block/ and Wordfence threat intelligence at https://www.wordfence.com/threat-intel/vulnerabilities/id/3144f190-232c-40c0-9e4b-d1cedfe52b26?source=cve.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Arbitrary file upload in a public-facing WordPress plugin enables exploitation of public-facing applications (T1190) and facilitates deployment of web shells for RCE (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References