CVE-2025-6220
BaseFortify
Publication date: 2025-06-18
Last updated on: 2025-07-09
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| themefic | ultimate_addons_for_contact_form_7 | to 3.5.13 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-6220 is a security vulnerability in the Ultimate Addons for Contact Form 7 WordPress plugin (version 3.5.12 and earlier) caused by improper file type validation in the plugin's 'save_options' function. Authenticated users with administrator privileges can upload arbitrary files, including malicious PHP scripts, because the plugin only checks if uploaded files have the MIME type 'application/octet-stream' without stricter validation or sanitization. This allows attackers to upload files like web shells to a web-accessible directory, potentially enabling remote code execution on the server. [1, 4]
How can this vulnerability impact me? :
This vulnerability allows authenticated administrators to upload arbitrary files, including malicious PHP web shells, to the server hosting the WordPress site. Once uploaded, these files can be accessed via a URL to execute arbitrary system commands remotely, leading to full remote code execution. This can compromise the entire server, allowing attackers to steal data, modify site content, install malware, or take control of the hosting environment. [1, 4]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of unauthorized PHP files in the upload directory `/wp-content/uploads/itinerary-fonts/`, especially files like `shell.php` that could be web shells. Network detection can involve monitoring HTTP requests to URLs such as `https://<target>/wp-content/uploads/itinerary-fonts/shell.php` with suspicious GET parameters like `cmd` used to execute commands. On the server, you can list files in the upload directory to find unexpected PHP files. For example, use the command `ls -l /path/to/wordpress/wp-content/uploads/itinerary-fonts/` to look for suspicious files. Additionally, monitoring web server logs for requests to this directory with unusual parameters can help detect exploitation attempts. Since exploitation requires authenticated administrator access, reviewing WordPress admin logs for suspicious activity around the Ultimate Addons settings page may also help. Specific commands include: - `ls -l /path/to/wordpress/wp-content/uploads/itinerary-fonts/` - `grep -i shell /path/to/wordpress/wp-content/uploads/itinerary-fonts/` - Checking web server access logs for requests to `/wp-content/uploads/itinerary-fonts/shell.php` or similar. Note that detection requires access to the server or logs and monitoring for unusual admin panel activity or unexpected files in the upload directory. [1, 4]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1. Update the Ultimate Addons for Contact Form 7 plugin to version 3.5.13 or later, where the vulnerability is fixed by enforcing strict file extension and MIME type validation for uploads. 2. If updating is not immediately possible, restrict administrator access to trusted users only, as exploitation requires authenticated admin privileges. 3. Manually audit and remove any suspicious files from the `/wp-content/uploads/itinerary-fonts/` directory. 4. Monitor and restrict file uploads in the plugin settings to prevent arbitrary file uploads. 5. Consider disabling or restricting the Ultimate Addons settings page temporarily until the patch is applied. Applying the official patch from version 3.5.13 is the most effective and recommended action, as it enforces proper validation of uploaded font files and prevents arbitrary file uploads. [2, 4]