First published: Sat Jan 25 2025(Updated: )
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPBookit | <=1.6.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0357 has a high severity due to its potential for arbitrary file uploads by unauthenticated attackers.
To fix CVE-2025-0357, update the WPBookit plugin to version 1.7.0 or higher, which addresses the insufficient file type validation issue.
CVE-2025-0357 affects WPBookit versions up to and including 1.6.9.
Yes, CVE-2025-0357 can be exploited remotely by unauthenticated attackers to upload arbitrary files.
CVE-2025-0357 can facilitate various attacks including web shell uploads and malware injection due to arbitrary file upload capabilities.