Cyber Posture

CVE-2025-2512

Critical

Published: 19 March 2025

Published
19 March 2025
Modified
08 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0231 84.8th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may backdoor web servers with web shells to establish persistent access to systems.

Security Summary

CVE-2025-2512 affects the File Away plugin for WordPress in all versions up to and including 3.9.9.0.1. The vulnerability stems from a missing capability check and lack of file type validation in the upload() function, enabling arbitrary file uploads. It has been assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type). The issue was published on 2025-03-19.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By uploading arbitrary files to the affected site's server, they can potentially achieve remote code execution, granting high levels of confidentiality, integrity, and availability impact.

Advisories and related resources, including a Wordfence threat intelligence report, the plugin's developer page on WordPress.org, the vulnerable code location in the plugin's Trac browser, and a public exploit repository on GitHub, provide further details for analysis and response. Security practitioners should consult these references for mitigation guidance, such as updating the plugin if a patch is available.

Details

CWE(s)
CWE-434

Affected Products

file away project
file away
≤ 3.9.9.0.1

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unrestricted arbitrary file upload in public-facing WordPress plugin directly enables T1190 (exploiting the vulnerable application) and T1505.003 (uploading web shell for RCE).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References