Cyber Posture

CVE-2025-6058

Critical

Published: 12 July 2025

Published
12 July 2025
Modified
16 July 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.2673 96.4th percentile
Risk Priority 36 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-6058 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Iqonic Wpbookit. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 3.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, and correction of the arbitrary file upload flaw in the WPBookit plugin, eliminating the vulnerability through patching.

prevent

Mandates validation of information inputs such as file types and contents at upload points, directly countering the missing file type validation in image_upload_handle().

prevent

Limits and controls permitted actions without identification or authentication, preventing unauthenticated exploitation of the 'add_booking_type' route for file uploads.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1100 Web Shell Persistence
A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network.
Why these techniques?

Arbitrary unauthenticated file upload in public-facing WP plugin directly enables T1190 exploitation and T1100 web shell deployment for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated…

more

attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Deeper analysisAI

CVE-2025-6058 is an arbitrary file upload vulnerability in the WPBookit plugin for WordPress, stemming from missing file type validation in the image_upload_handle() function, which is hooked via the 'add_booking_type' route. This flaw affects all versions of the plugin up to and including 1.0.4. The vulnerability is rated with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type), published on 2025-07-12.

Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By leveraging the affected route, they can upload arbitrary files to the WordPress site's server, potentially enabling remote code execution depending on the file type and server configuration.

Advisories and references, including Wordfence threat intelligence and WordPress plugin repository details such as the source code at line 455 in class.wpb-booking-type-controller.php and changeset 3314288, provide technical insights into the vulnerability for mitigation and patching guidance.

Details

CWE(s)

Affected Products

iqonic
wpbookit
≤ 1.0.5

CVEs Like This One

CVE-2025-6057Same product: Iqonic Wpbookit
CVE-2025-0357Same product: Iqonic Wpbookit
CVE-2025-26910Same product: Iqonic Wpbookit
CVE-2024-10215Same product: Iqonic Wpbookit
CVE-2025-49387Shared CWE-434
CVE-2025-52353Shared CWE-434
CVE-2025-25790Shared CWE-434
CVE-2025-22504Shared CWE-434
CVE-2026-33717Shared CWE-434
CVE-2025-14894Shared CWE-434

References