CVE-2025-6057
Published: 12 July 2025
Summary
CVE-2025-6057 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Iqonic Wpbookit. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 14.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates validation of file types and content in uploads, directly countering the missing file type validation in the WPBookit plugin's handle_image_upload() function.
Requires timely identification, reporting, and patching of the arbitrary file upload flaw in WPBookit versions up to 1.0.4.
Deploys malicious code protection mechanisms to scan and block potentially executable files uploaded via the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload in public-facing WordPress plugin directly enables T1190 (initial access via public app exploit) and web shell deployment (T1100/T1505.003) leading to RCE.
NVD Description
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_image_upload() function in all versions up to, and including, 1.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and…
more
above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Deeper analysisAI
CVE-2025-6057 is an arbitrary file upload vulnerability in the WPBookit plugin for WordPress, affecting all versions up to and including 1.0.4. The flaw arises from missing file type validation in the handle_image_upload() function, classified under CWE-434 with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Published on 2025-07-12, it allows attackers to bypass intended restrictions on uploaded files.
Authenticated attackers with Subscriber-level access or higher can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables uploading arbitrary files to the affected site's server, which may lead to remote code execution depending on the file type and server configuration.
Advisories and references, including Wordfence's threat intelligence report, the WPBookit plugin page on WordPress.org, and trac repositories showing the vulnerable code in class.wpb-profile-controller.php and a related changeset, provide technical details on the issue. Security practitioners should review these sources for implementation specifics and apply updates beyond version 1.0.4 to mitigate the risk.
Details
- CWE(s)