First published: Sat Apr 05 2025(Updated: )
The Drag and Drop Multiple File Upload for WooCommerce plugin for WordPress is vulnerable to arbitrary file moving due to insufficient file path validation via the wc-upload-file[] parameter in all versions up to, and including, 1.1.4. This makes it possible for unauthenticated attackers to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php).
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WooCommerce Drag and Drop Multiple File Upload for WooCommerce | <=1.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2941 is rated as a high severity vulnerability due to its potential for arbitrary file movement.
To fix CVE-2025-2941, update the Drag and Drop Multiple File Upload for WooCommerce plugin to version 1.1.5 or later.
Any user of the Drag and Drop Multiple File Upload for WooCommerce plugin in versions up to and including 1.1.4 is affected by CVE-2025-2941.
CVE-2025-2941 is an arbitrary file moving vulnerability resulting from insufficient file path validation.
Yes, CVE-2025-2941 can be exploited by unauthenticated users, making it a severe security risk.