CVE-2025-6058
Published: 12 July 2025
Summary
CVE-2025-6058 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Iqonic Wpbookit. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 3.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires identification, reporting, and correction of the arbitrary file upload flaw in the WPBookit plugin, eliminating the vulnerability through patching.
Mandates validation of information inputs such as file types and contents at upload points, directly countering the missing file type validation in image_upload_handle().
Limits and controls permitted actions without identification or authentication, preventing unauthenticated exploitation of the 'add_booking_type' route for file uploads.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary unauthenticated file upload in public-facing WP plugin directly enables T1190 exploitation and T1100 web shell deployment for RCE.
NVD Description
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated…
more
attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Deeper analysisAI
CVE-2025-6058 is an arbitrary file upload vulnerability in the WPBookit plugin for WordPress, stemming from missing file type validation in the image_upload_handle() function, which is hooked via the 'add_booking_type' route. This flaw affects all versions of the plugin up to and including 1.0.4. The vulnerability is rated with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type), published on 2025-07-12.
Unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By leveraging the affected route, they can upload arbitrary files to the WordPress site's server, potentially enabling remote code execution depending on the file type and server configuration.
Advisories and references, including Wordfence threat intelligence and WordPress plugin repository details such as the source code at line 455 in class.wpb-booking-type-controller.php and changeset 3314288, provide technical insights into the vulnerability for mitigation and patching guidance.
Details
- CWE(s)