- Description
- The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
- Source
- security@wordfence.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- security@wordfence.com
- CWE-434
- Hype score
- Not currently trending
CVE-2025-0357 The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' … https://t.co/Ln2lUmEsZH
@CVEnew
25 Jan 2025
449 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-0357: CRITICAL] WordPress plugin WPBookit is at risk of arbitrary file uploads in versions up to 1.6.9, allowing unauthenticated hackers to potentially execute remote code on vulnerable sites.#cybersecurity,#vulnerability https://t.co/sm88xl5Qnt https://t.co/szVcWdyToF
@CveFindCom
25 Jan 2025
48 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes