CVE-2025-12673
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-06

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The Flex QR Code Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the update_qr_code() function in all versions up to, and including, 1.2.7. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-06
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2025-12-06
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordpress flex_qr_code_generator 1.2.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the Flex QR Code Generator plugin for WordPress allows unauthenticated attackers to upload arbitrary files to the server because the plugin's update_qr_code() function does not properly validate file types. This flaw exists in all versions up to and including 1.2.6.


How can this vulnerability impact me? :

This vulnerability can allow attackers to upload malicious files, potentially leading to remote code execution on the affected server. This can compromise the website, allowing attackers to take control, steal data, or disrupt services.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not contain information on how CVE-2025-12673 affects compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking if your WordPress site is running the Flex QR Code Generator plugin version 1.2.6 or earlier. To confirm exploitation attempts or presence of uploaded malicious files, monitor HTTP POST requests to the AJAX endpoint `admin-ajax.php` with the parameter `action=flexqr_update_qr`. Look for uploads under the `logo` field containing suspicious files, especially PHP scripts. A practical detection method is to search your WordPress uploads directory for unexpected PHP files named with patterns like `shell_*.php` or files appended with QR code IDs. Example commands on the server to find suspicious files include: `find wp-content/uploads/ -type f -name '*.php'` to locate PHP files in the uploads directory. Additionally, you can use network monitoring tools or web server logs to filter POST requests to `admin-ajax.php` with `action=flexqr_update_qr`. These indicators help detect attempts or successful exploitation of the vulnerability. [1, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Update the Flex QR Code Generator plugin to a version later than 1.2.6 where the vulnerability is fixed. 2) If an update is not immediately possible, restrict access to the AJAX endpoint `admin-ajax.php` for the action `flexqr_update_qr` by implementing firewall rules or web application firewall (WAF) rules to block unauthenticated POST requests to this endpoint. 3) Manually inspect and remove any suspicious PHP files in the WordPress uploads directory that may have been uploaded via this vulnerability. 4) Review and harden file upload permissions and ensure proper validation and sanitization are enforced. 5) Monitor logs for suspicious activity related to this AJAX action. These steps help prevent exploitation and limit damage from existing compromises. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart