CVE-2025-6220
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-18

Last updated on: 2025-07-09

Assigner: Wordfence

Description
The Ultra Addons for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'save_options' function in all versions up to, and including, 3.5.12. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-18
Last Modified
2025-07-09
Generated
2026-05-07
AI Q&A
2025-06-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
themefic ultimate_addons_for_contact_form_7 to 3.5.13 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-6220 is a security vulnerability in the Ultimate Addons for Contact Form 7 WordPress plugin (version 3.5.12 and earlier) caused by improper file type validation in the plugin's 'save_options' function. Authenticated users with administrator privileges can upload arbitrary files, including malicious PHP scripts, because the plugin only checks if uploaded files have the MIME type 'application/octet-stream' without stricter validation or sanitization. This allows attackers to upload files like web shells to a web-accessible directory, potentially enabling remote code execution on the server. [1, 4]


How can this vulnerability impact me? :

This vulnerability allows authenticated administrators to upload arbitrary files, including malicious PHP web shells, to the server hosting the WordPress site. Once uploaded, these files can be accessed via a URL to execute arbitrary system commands remotely, leading to full remote code execution. This can compromise the entire server, allowing attackers to steal data, modify site content, install malware, or take control of the hosting environment. [1, 4]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking for the presence of unauthorized PHP files in the upload directory `/wp-content/uploads/itinerary-fonts/`, especially files like `shell.php` that could be web shells. Network detection can involve monitoring HTTP requests to URLs such as `https://<target>/wp-content/uploads/itinerary-fonts/shell.php` with suspicious GET parameters like `cmd` used to execute commands. On the server, you can list files in the upload directory to find unexpected PHP files. For example, use the command `ls -l /path/to/wordpress/wp-content/uploads/itinerary-fonts/` to look for suspicious files. Additionally, monitoring web server logs for requests to this directory with unusual parameters can help detect exploitation attempts. Since exploitation requires authenticated administrator access, reviewing WordPress admin logs for suspicious activity around the Ultimate Addons settings page may also help. Specific commands include: - `ls -l /path/to/wordpress/wp-content/uploads/itinerary-fonts/` - `grep -i shell /path/to/wordpress/wp-content/uploads/itinerary-fonts/` - Checking web server access logs for requests to `/wp-content/uploads/itinerary-fonts/shell.php` or similar. Note that detection requires access to the server or logs and monitoring for unusual admin panel activity or unexpected files in the upload directory. [1, 4]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1. Update the Ultimate Addons for Contact Form 7 plugin to version 3.5.13 or later, where the vulnerability is fixed by enforcing strict file extension and MIME type validation for uploads. 2. If updating is not immediately possible, restrict administrator access to trusted users only, as exploitation requires authenticated admin privileges. 3. Manually audit and remove any suspicious files from the `/wp-content/uploads/itinerary-fonts/` directory. 4. Monitor and restrict file uploads in the plugin settings to prevent arbitrary file uploads. 5. Consider disabling or restricting the Ultimate Addons settings page temporarily until the patch is applied. Applying the official patch from version 3.5.13 is the most effective and recommended action, as it enforces proper validation of uploaded font files and prevents arbitrary file uploads. [2, 4]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart