First published: Thu May 15 2025(Updated: )
The 百度站长SEO合集(支持百度/神马/Bing/头条推送) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the download_remote_image_to_media_library function in all versions up to, and including, 2.0.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
百度 站长SEO合集 | <=2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3917 is categorized as a critical vulnerability due to its potential for arbitrary file uploads which can lead to severe exploitation.
To fix CVE-2025-3917, update the 百度站长SEO合集 plugin to version 2.0.7 or later where the vulnerability has been addressed.
All users of the 百度站长SEO合集 plugin for WordPress up to and including version 2.0.6 are affected by CVE-2025-3917.
CVE-2025-3917 allows unauthenticated attackers to upload arbitrary files to the server, potentially leading to the execution of malicious code.
If you cannot update to a fixed version for CVE-2025-3917, a temporary workaround is to disable the plugin until a proper update can be applied.