CVE-2025-53260
BaseFortify
Publication date: 2025-06-27
Last updated on: 2026-04-23
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the WordPress File Manager Plugin (up to version 7.5) allows an attacker with administrator privileges to upload any type of file, including malicious web shells, to the website. This arbitrary file upload can enable the attacker to execute backdoors and gain further unauthorized access to the web server. It is classified as an injection vulnerability with a high severity CVSS score of 9.1. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker to upload and execute malicious files on your web server, potentially leading to full compromise of the website. This includes unauthorized access, data theft, defacement, or further attacks on the server. However, exploitation requires administrator privileges, which reduces the likelihood but does not eliminate the risk. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection involves scanning the server for uploaded malicious files such as web shells. Since the vulnerability allows arbitrary file uploads by administrators, checking for unexpected or suspicious files in upload directories is recommended. Server-side malware scanning tools should be used rather than plugin-based scanners, as the latter can be tampered with by malware. Specific commands are not provided in the resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation includes deploying virtual patching (vPatching) provided by Patchstack to auto-mitigate the vulnerability in the absence of an official fix. Additionally, restrict administrator privileges carefully, perform professional incident response if compromise is suspected, and conduct server-side malware scanning. Avoid relying solely on plugin-based malware scanners. [1]