Cyber Posture

CVE-2025-0357

Critical

Published: 25 January 2025

Published
25 January 2025
Modified
27 June 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0098 76.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0357 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Iqonic Wpbookit. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 23.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces comprehensive input validation, directly addressing the insufficient file type validation in the WPB_Profile_controller::handle_image_upload function that enables arbitrary file uploads.

prevent

Requires timely identification, reporting, and remediation of software flaws like CVE-2025-0357 through patching the vulnerable WPBookit plugin versions up to 1.6.9.

preventdetect

Provides malicious code protection mechanisms that scan and block dangerous uploaded files, mitigating potential remote code execution from exploited arbitrary file uploads.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Arbitrary file upload flaw in public WordPress plugin directly enables remote exploitation of a public-facing web app (T1190) and subsequent web shell deployment for RCE (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on…

more

the affected site's server which may make remote code execution possible.

Deeper analysisAI

CVE-2025-0357 is a critical vulnerability in the WPBookit plugin for WordPress, affecting versions up to and including 1.6.9. It stems from insufficient file type validation in the WPB_Profile_controller::handle_image_upload function, enabling arbitrary file uploads. This flaw, associated with CWE-434 (Unrestricted Upload of File with Dangerous Type), has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility and lack of prerequisites.

Unauthenticated attackers can exploit this vulnerability remotely without privileges or user interaction. By uploading arbitrary files to the affected WordPress site's server, they may achieve remote code execution, potentially compromising the entire server.

Advisories and patch information are available in the WPBookit change log at https://documentation.iqonic.design/wpbookit/versions/change-log and the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/19bf7a68-e76d-4740-9f35-b6084094f59b?source=cve, which detail mitigation steps and updates addressing the issue.

Details

CWE(s)

Affected Products

iqonic
wpbookit
≤ 1.6.10

CVEs Like This One

CVE-2025-6057Same product: Iqonic Wpbookit
CVE-2025-6058Same product: Iqonic Wpbookit
CVE-2025-26910Same product: Iqonic Wpbookit
CVE-2024-10215Same product: Iqonic Wpbookit
CVE-2020-36942Shared CWE-434
CVE-2024-57169Shared CWE-434
CVE-2023-53933Shared CWE-434
CVE-2025-68909Shared CWE-434
CVE-2021-47757Shared CWE-434
CVE-2025-68986Shared CWE-434

References