CVE-2025-0357

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:iqonic:wpbookit:*:*:*:*:pro:wordpress:*:*

History

27 Jun 2025, 17:38

Type Values Removed Values Added
References () https://documentation.iqonic.design/wpbookit/versions/change-log - () https://documentation.iqonic.design/wpbookit/versions/change-log - Release Notes
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/19bf7a68-e76d-4740-9f35-b6084094f59b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/19bf7a68-e76d-4740-9f35-b6084094f59b?source=cve - Third Party Advisory
Summary
  • (es) El complemento WPBookit para WordPress es vulnerable a la carga de archivos arbitrarios debido a una validación insuficiente del tipo de archivo en la función 'WPB_Profile_controller::handle_image_upload' en versiones hasta la 1.6.9 y incluida. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecución remota de código.
CPE cpe:2.3:a:iqonic:wpbookit:*:*:*:*:pro:wordpress:*:*
First Time Iqonic
Iqonic wpbookit

25 Jan 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-25 02:15

Updated : 2025-06-27 17:38


NVD link : CVE-2025-0357

Mitre link : CVE-2025-0357

CVE.ORG link : CVE-2025-0357


JSON object : View

Products Affected

iqonic

  • wpbookit
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type