
CVE-2025-3455 – 1 Click WordPress Migration Plugin – 100% FREE for a limited time <= 2.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2025-3455
08 May 2025 — The 1 Click WordPress Migration Plugin – 100% FREE for a limited time plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'start_restore' function in all versions up to, and including, 2.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://www.wordfence.com/threat-intel/vulnerabilities/id/e982ae88-cfd0-46b9-ad64-00e398d307d6?source=cve • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2025-47658 – WordPress ELEX WordPress HelpDesk & Customer Ticketing System <= 3.2.7 - Arbitrary File Upload Vulnerability
https://notcve.org/view.php?id=CVE-2025-47658
08 May 2025 — Unrestricted Upload of File with Dangerous Type vulnerability in ELEXtensions ELEX WordPress HelpDesk & Customer Ticketing System allows Upload a Web Shell to a Web Server. This issue affects ELEX WordPress HelpDesk & Customer Ticketing System: from n/a through 3.2.7. The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 3.2.7. This makes it pos... • https://patchstack.com/database/wordpress/plugin/elex-helpdesk-customer-support-ticket-system/vulnerability/wordpress-elex-wordpress-helpdesk-customer-ticketing-system-3-2-7-arbitrary-file-upload-vulnerability? • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2025-4206 – WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg <= 4.1.1.2 - Authenticated (Administrator+) Arbitrary File Deletion
https://notcve.org/view.php?id=CVE-2025-4206
08 May 2025 — The WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'process_export_delete' and 'process_import_delete' functions in all versions up to, and including, 4.1.1.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execut... • https://plugins.trac.wordpress.org/browser/groundhogg/trunk/admin/tools/tools-page.php#L701 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2024-11617 – Envolve Plugin <= 1.0 - Unauthenticated Arbitrary File Upload via language_file and fonts_file
https://notcve.org/view.php?id=CVE-2024-11617
08 May 2025 — The Envolve Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'zetra_languageUpload' and 'zetra_fontsUpload' functions in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://themeforest.net/item/envolve-consulting-business-wordpress-theme/28748459 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2025-47549 – WordPress BEAF <= 4.6.10 - Arbitrary File Upload Vulnerability
https://notcve.org/view.php?id=CVE-2025-47549
07 May 2025 — The Ultimate Before After Image Slider & Gallery – BEAF plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 4.6.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://patchstack.com/database/wordpress/plugin/beaf-before-and-after-gallery/vulnerability/wordpress-beaf-4-6-10-arbitrary-file-upload-vulnerability? • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2025-47550 – WordPress Instantio <= 3.3.16 - Arbitrary File Upload Vulnerability
https://notcve.org/view.php?id=CVE-2025-47550
07 May 2025 — The Instantio – WooCommerce Quick Checkout | Direct Checkout, Floating Cart, Side Cart & Popup Cart plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 3.3.16. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://patchstack.com/database/wordpress/plugin/instantio/vulnerability/wordpress-instantio-3-3-16-arbitrary-file-upload-vulnerability? • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2025-47691 – WordPress Ultimate Member plugin <= 2.10.3 - Arbitrary Function Call vulnerability
https://notcve.org/view.php?id=CVE-2025-47691
07 May 2025 — The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Arbitrary Function Calls in all versions up to, and including, 2.10.3. ... This makes it possible for authenticated attackers, with Administrator-level access and above, to execute arbitrary functions making remote code execution possible. • https://patchstack.com/database/wordpress/plugin/ultimate-member/vulnerability/wordpress-ultimate-member-plugin-2-10-3-arbitrary-function-call-vulnerability? • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2025-4190 – CSV Mass Importer <= 1.2 - Admin+ Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2025-4190
07 May 2025 — The CSV Mass Importer WordPress plugin through 1.2 does not properly validate uploaded files, allowing high privilege users such as admin to upload arbitrary files on the server even when they should not be allowed to (for example in multisite setup) The CSV Mass Importer plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 1.2. This makes it possible for authenticated attackers, with Administrator-level access a... • https://packetstorm.news/files/id/190857 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2025-3610 – Reales WP STPT <= 2.1.2 - Authenticated (Subscriber+) Privilege Escalation via Password Update
https://notcve.org/view.php?id=CVE-2025-3610
05 May 2025 — The Reales WP STPT plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.1.2. ... This can be combined with CVE-2025-3609 to achieve remote code execution as an originally unauthenticated user with no account. • https://themeforest.net/item/reales-wp-real-estate-wordpress-theme/10330568 • CWE-639: Authorization Bypass Through User-Controlled Key •

CVE-2025-4279 – External image replace <= 1.0.8 - Authenticated (Contributor+) Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2025-4279
05 May 2025 — The External image replace plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'external_image_replace_get_posts::replace_post' function in all versions up to, and including, 1.0.8. This makes it possible for authenticated attackers, with contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://plugins.trac.wordpress.org/browser/external-image-replace/tags/1.0.8/class.php#L87 • CWE-434: Unrestricted Upload of File with Dangerous Type •