Cyber Posture

CVE-2025-2512

Critical

Published: 19 March 2025

Published
19 March 2025
Modified
08 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0231 84.9th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2512 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in File Away Project File Away. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 15.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation of the specific flaw in the File Away plugin's upload function via patching to eliminate arbitrary file upload vulnerability.

prevent

Mandates validation of uploaded files to enforce type restrictions, directly countering the missing file type validation in the upload function.

prevent

Enforces access authorizations with capability checks to block unauthenticated attackers from reaching the vulnerable upload function.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unrestricted arbitrary file upload in public-facing WordPress plugin directly enables T1190 (exploiting the vulnerable application) and T1505.003 (uploading web shell for RCE).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The File Away plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check and missing file type validation in the upload() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for…

more

unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Deeper analysisAI

CVE-2025-2512 affects the File Away plugin for WordPress in all versions up to and including 3.9.9.0.1. The vulnerability stems from a missing capability check and lack of file type validation in the upload() function, enabling arbitrary file uploads. It has been assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type). The issue was published on 2025-03-19.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By uploading arbitrary files to the affected site's server, they can potentially achieve remote code execution, granting high levels of confidentiality, integrity, and availability impact.

Advisories and related resources, including a Wordfence threat intelligence report, the plugin's developer page on WordPress.org, the vulnerable code location in the plugin's Trac browser, and a public exploit repository on GitHub, provide further details for analysis and response. Security practitioners should consult these references for mitigation guidance, such as updating the plugin if a patch is available.

Details

CWE(s)

Affected Products

file away project
file away
≤ 3.9.9.0.1

CVEs Like This One

CVE-2025-2539Same product: File Away Project File Away
CVE-2020-36942Shared CWE-434
CVE-2024-57169Shared CWE-434
CVE-2023-53933Shared CWE-434
CVE-2025-68909Shared CWE-434
CVE-2021-47757Shared CWE-434
CVE-2025-68986Shared CWE-434
CVE-2025-56704Shared CWE-434
CVE-2025-0471Shared CWE-434
CVE-2025-7437Shared CWE-434

References