CVE-2025-6423
Published: 12 July 2025
Summary
CVE-2025-6423 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Themeforest (inferred from references). Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 19.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of flaws such as the arbitrary file upload vulnerability in the BeeTeam368 Extensions plugin.
Mandates validation of uploaded file types and contents to directly counter the missing file type validation in the handle_submit_upload_file() function.
Restricts types of allowed inputs, such as prohibiting dangerous file extensions, to block arbitrary file uploads by authenticated users.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload in public-facing WordPress plugin directly enables T1190 exploitation for initial access, T1505.003 web shell deployment, and T1105 tool/file ingress leading to RCE.
NVD Description
The BeeTeam368 Extensions plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_submit_upload_file() function in all versions up to, and including, 2.3.5. This makes it possible for authenticated attackers with Subscriber-level access…
more
or higher to upload arbitrary files on the affected site's server which may make remote code execution possible.
Deeper analysisAI
CVE-2025-6423, published on 2025-07-12, is an arbitrary file upload vulnerability in the BeeTeam368 Extensions plugin for WordPress, affecting all versions up to and including 2.3.5. The flaw arises from missing file type validation in the handle_submit_upload_file() function, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
Authenticated attackers with Subscriber-level access or higher can exploit this vulnerability over the network with low complexity and no user interaction required. By leveraging the inadequate validation, they can upload arbitrary files to the affected site's server, potentially leading to remote code execution.
Mitigation details are available in related advisories, including the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/96170b82-6ed9-4a52-8592-944163cdd3cf?source=cve and the plugin's change log on ThemeForest at https://themeforest.net/item/vidmov-video-wordpress-theme/35542187#item-description__change-log.
Details
- CWE(s)