Cyber Posture

CVE-2025-6057

High

Published: 12 July 2025

Published
12 July 2025
Modified
16 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0261 85.7th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-6057 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Iqonic Wpbookit. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 14.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates validation of file types and content in uploads, directly countering the missing file type validation in the WPBookit plugin's handle_image_upload() function.

prevent

Requires timely identification, reporting, and patching of the arbitrary file upload flaw in WPBookit versions up to 1.0.4.

preventdetect

Deploys malicious code protection mechanisms to scan and block potentially executable files uploaded via the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1100 Web Shell Persistence
A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Arbitrary file upload in public-facing WordPress plugin directly enables T1190 (initial access via public app exploit) and web shell deployment (T1100/T1505.003) leading to RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_image_upload() function in all versions up to, and including, 1.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and…

more

above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Deeper analysisAI

CVE-2025-6057 is an arbitrary file upload vulnerability in the WPBookit plugin for WordPress, affecting all versions up to and including 1.0.4. The flaw arises from missing file type validation in the handle_image_upload() function, classified under CWE-434 with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). Published on 2025-07-12, it allows attackers to bypass intended restrictions on uploaded files.

Authenticated attackers with Subscriber-level access or higher can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables uploading arbitrary files to the affected site's server, which may lead to remote code execution depending on the file type and server configuration.

Advisories and references, including Wordfence's threat intelligence report, the WPBookit plugin page on WordPress.org, and trac repositories showing the vulnerable code in class.wpb-profile-controller.php and a related changeset, provide technical details on the issue. Security practitioners should review these sources for implementation specifics and apply updates beyond version 1.0.4 to mitigate the risk.

Details

CWE(s)

Affected Products

iqonic
wpbookit
≤ 1.0.5

CVEs Like This One

CVE-2025-0357Same product: Iqonic Wpbookit
CVE-2025-6058Same product: Iqonic Wpbookit
CVE-2025-26910Same product: Iqonic Wpbookit
CVE-2024-10215Same product: Iqonic Wpbookit
CVE-2025-67924Shared CWE-434
CVE-2026-38526Shared CWE-434
CVE-2025-62056Shared CWE-434
CVE-2026-27067Shared CWE-434
CVE-2025-1572Same vendor: Iqonic
CVE-2020-36942Shared CWE-434

References