CVE-2025-49329
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-06

Last updated on: 2026-04-23

Assigner: Patchstack

Description
Unrestricted Upload of File with Dangerous Type vulnerability in Agile Logix Store Locator WordPress agile-store-locator allows Upload a Web Shell to a Web Server.This issue affects Store Locator WordPress: from n/a through <= 1.5.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-06
Last Modified
2026-04-23
Generated
2026-05-07
AI Q&A
2025-06-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Arbitrary File Upload issue in the Agile Logix Store Locator WordPress plugin (up to version 1.5.2). It allows an attacker with administrator privileges to upload any type of file, including malicious web shells, to the website. These files can be executed to gain further unauthorized access to the web server. The vulnerability falls under the OWASP Top 10 category A3: Injection and has a CVSS score of 6.6, indicating a low severity impact. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to upload and execute malicious files such as web shells on your web server. This can lead to unauthorized access, data manipulation, or further compromise of your website and server environment. Although exploitation is considered unlikely, it poses a risk of significant security breaches if successful. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves checking for unauthorized file uploads, especially web shells, in the WordPress Store Locator plugin directories. Since the vulnerability allows arbitrary file uploads by administrators, monitoring for unusual or unexpected files (e.g., PHP web shells) is key. Plugin-based malware scanners may be unreliable, so manual inspection or professional incident response is recommended. Specific commands are not provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the Agile Store Locator WordPress plugin to version 1.5.3 or later, where the vulnerability is fixed. Additionally, Patchstack offers virtual patching (vPatching) to auto-mitigate this and other vulnerabilities before official patches are applied. If compromise is suspected, seek professional incident response. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart