Cyber Posture

CVE-2024-8425

Critical

Published: 28 February 2025

Published
28 February 2025
Modified
08 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.4270 97.5th percentile
Risk Priority 45 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-8425 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Wpswings Woocommerce Ultimate Gift Card. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 2.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and patching of the specific flaw in the WooCommerce plugin enabling arbitrary file uploads due to insufficient validation.

prevent

Directly enforces validation of information inputs like file types in upload functions to block arbitrary files from being accepted on the server.

preventdetect

Deploys malicious code protection at entry points to scan and prevent or detect uploaded arbitrary files that could lead to remote code execution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Arbitrary unauthenticated file upload in public-facing WordPress plugin directly enables web shell deployment and RCE via T1190 exploitation of the application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The WooCommerce Ultimate Gift Card plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'mwb_wgm_preview_mail' and 'mwb_wgm_woocommerce_add_cart_item_data' functions in all versions up to, and including, 2.9.2. This makes it possible for unauthenticated…

more

attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that this may have been patched on an older version than 2.9.2, however, we do not have access to older versions of the software to confirm when the patch was added. The only patched version we have confirmed is 2.9.3.

Deeper analysisAI

CVE-2024-8425 is a critical vulnerability in the WooCommerce Ultimate Gift Card plugin for WordPress, affecting all versions up to and including 2.9.2. It stems from insufficient file type validation in the 'mwb_wgm_preview_mail' and 'mwb_wgm_woocommerce_add_cart_item_data' functions, enabling arbitrary file uploads (CWE-434). Published on 2025-02-28, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Unauthenticated attackers can exploit this flaw remotely over the network with low complexity and no privileges required. By uploading arbitrary files to the affected WordPress site's server, they may achieve remote code execution, potentially leading to full server compromise.

The vulnerability has been patched in version 2.9.3, though it may have been addressed in an earlier release without confirmation due to lack of access to older versions. Security practitioners should update to at least 2.9.3 and refer to the Wordfence advisory for detailed threat intelligence or the plugin's CodeCanyon page for version history.

Details

CWE(s)

Affected Products

wpswings
woocommerce ultimate gift card
≤ 2.6.0

CVEs Like This One

CVE-2024-13359Same product class: WordPress / CMS plugin
CVE-2025-7340Same product class: WordPress / CMS plugin
CVE-2024-13641Same product class: WordPress / CMS plugin
CVE-2025-1661Same product class: WordPress / CMS plugin
CVE-2020-36942Shared CWE-434
CVE-2024-57169Shared CWE-434
CVE-2023-53933Shared CWE-434
CVE-2025-68909Shared CWE-434
CVE-2021-47757Shared CWE-434
CVE-2025-68986Shared CWE-434

References