CVE-2025-2512
Published: 19 March 2025
Summary
CVE-2025-2512 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in File Away Project File Away. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 15.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the specific flaw in the File Away plugin's upload function via patching to eliminate arbitrary file upload vulnerability.
Mandates validation of uploaded files to enforce type restrictions, directly countering the missing file type validation in the upload function.
Enforces access authorizations with capability checks to block unauthenticated attackers from reaching the vulnerable upload function.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted arbitrary file upload in public-facing WordPress plugin directly enables T1190 (exploiting the vulnerable application) and T1505.003 (uploading web shell for RCE).
NVD Description
The File Away plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check and missing file type validation in the upload() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for…
more
unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Deeper analysisAI
CVE-2025-2512 affects the File Away plugin for WordPress in all versions up to and including 3.9.9.0.1. The vulnerability stems from a missing capability check and lack of file type validation in the upload() function, enabling arbitrary file uploads. It has been assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type). The issue was published on 2025-03-19.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By uploading arbitrary files to the affected site's server, they can potentially achieve remote code execution, granting high levels of confidentiality, integrity, and availability impact.
Advisories and related resources, including a Wordfence threat intelligence report, the plugin's developer page on WordPress.org, the vulnerable code location in the plugin's Trac browser, and a public exploit repository on GitHub, provide further details for analysis and response. Security practitioners should consult these references for mitigation guidance, such as updating the plugin if a patch is available.
Details
- CWE(s)