9.8
CVE-2025-2005
- EPSS 1.45%
- Veröffentlicht 02.04.2025 10:15:19
- Zuletzt bearbeitet 12.08.2025 17:14:54
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Front-End-Only-Users <= 3.2.32 - Unauthenticated Arbitrary File Upload
The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Mögliche Gegenmaßnahme
Front End Users: Update to version 3.2.33, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Front End Users
Version
*-3.2.32
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Etoilewebdesign ≫ Front End Users SwPlatformwordpress Version <= 3.2.32
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.45% | 0.804 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.