CVE-2025-0357
Published: 25 January 2025
Summary
CVE-2025-0357 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Iqonic Wpbookit. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 23.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces comprehensive input validation, directly addressing the insufficient file type validation in the WPB_Profile_controller::handle_image_upload function that enables arbitrary file uploads.
Requires timely identification, reporting, and remediation of software flaws like CVE-2025-0357 through patching the vulnerable WPBookit plugin versions up to 1.6.9.
Provides malicious code protection mechanisms that scan and block dangerous uploaded files, mitigating potential remote code execution from exploited arbitrary file uploads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload flaw in public WordPress plugin directly enables remote exploitation of a public-facing web app (T1190) and subsequent web shell deployment for RCE (T1505.003).
NVD Description
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on…
more
the affected site's server which may make remote code execution possible.
Deeper analysisAI
CVE-2025-0357 is a critical vulnerability in the WPBookit plugin for WordPress, affecting versions up to and including 1.6.9. It stems from insufficient file type validation in the WPB_Profile_controller::handle_image_upload function, enabling arbitrary file uploads. This flaw, associated with CWE-434 (Unrestricted Upload of File with Dangerous Type), has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility and lack of prerequisites.
Unauthenticated attackers can exploit this vulnerability remotely without privileges or user interaction. By uploading arbitrary files to the affected WordPress site's server, they may achieve remote code execution, potentially compromising the entire server.
Advisories and patch information are available in the WPBookit change log at https://documentation.iqonic.design/wpbookit/versions/change-log and the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/19bf7a68-e76d-4740-9f35-b6084094f59b?source=cve, which detail mitigation steps and updates addressing the issue.
Details
- CWE(s)