CVE-2025-2512
Published: 19 March 2025
Description
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Security Summary
CVE-2025-2512 affects the File Away plugin for WordPress in all versions up to and including 3.9.9.0.1. The vulnerability stems from a missing capability check and lack of file type validation in the upload() function, enabling arbitrary file uploads. It has been assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type). The issue was published on 2025-03-19.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By uploading arbitrary files to the affected site's server, they can potentially achieve remote code execution, granting high levels of confidentiality, integrity, and availability impact.
Advisories and related resources, including a Wordfence threat intelligence report, the plugin's developer page on WordPress.org, the vulnerable code location in the plugin's Trac browser, and a public exploit repository on GitHub, provide further details for analysis and response. Security practitioners should consult these references for mitigation guidance, such as updating the plugin if a patch is available.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Unrestricted arbitrary file upload in public-facing WordPress plugin directly enables T1190 (exploiting the vulnerable application) and T1505.003 (uploading web shell for RCE).