Cyber Posture

CVE-2025-68549

Critical

Published: 20 February 2026

Published
20 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0006 19.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-68549 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the unrestricted file upload flaw in Wiguard WordPress theme versions prior to 2.0.1 by identifying, reporting, and applying patches.

prevent

Requires validation of file upload inputs to reject dangerous types like web shells, preventing exploitation even in unpatched systems.

preventdetect

Deploys malicious code protection mechanisms at system entry points to scan and block web shells uploaded via the vulnerable theme.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1100 Web Shell Persistence
A Web shell is a Web script that is placed on an openly accessible Web server to allow an adversary to use the Web server as a gateway into a network.
Why these techniques?

Direct arbitrary file upload of web shell in public-facing WordPress component enables T1190 initial access and T1100 web shell deployment for RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Wiguard wiguard allows Upload a Web Shell to a Web Server.This issue affects Wiguard: from n/a through < 2.0.1.

Deeper analysisAI

CVE-2025-68549 is an Unrestricted Upload of File with Dangerous Type vulnerability (CWE-434) in the Wiguard WordPress theme developed by zozothemes. It allows attackers to upload a web shell to the web server. The vulnerability affects all versions of Wiguard from n/a through those prior to 2.0.1. Published on 2026-02-20, it has a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its high impact and scope expansion.

An attacker with low privileges, such as an authenticated WordPress user, can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables uploading a malicious web shell, potentially granting remote code execution on the server and leading to high confidentiality, integrity, and availability impacts across the affected system and beyond due to the scope change.

The Patchstack advisory for this WordPress theme vulnerability confirms it as an arbitrary file upload issue fixed in version 2.0.1, recommending immediate updates to patched versions for mitigation.

Details

CWE(s)

CVEs Like This One

CVE-2025-49387Shared CWE-434
CVE-2025-52353Shared CWE-434
CVE-2025-25790Shared CWE-434
CVE-2025-22504Shared CWE-434
CVE-2026-33717Shared CWE-434
CVE-2025-14894Shared CWE-434
CVE-2025-65783Shared CWE-434
CVE-2025-44658Shared CWE-434
CVE-2026-37748Shared CWE-434
CVE-2025-50002Shared CWE-434

References