CVE-2021-4457

| EUVD-2021-34682 CRITICAL
2025-06-25 [email protected]
9.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 23:19 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 23:19 euvd
EUVD-2021-34682
PoC Detected
Jul 07, 2025 - 17:40 vuln.today
Public exploit code
CVE Published
Jun 25, 2025 - 15:15 nvd
CRITICAL 9.1

Description

The ZoomSounds plugin before 6.05 contains a PHP file allowing unauthenticated users to upload an arbitrary file anywhere on the web server.

Analysis

CVE-2021-4457 is an unauthenticated arbitrary file upload vulnerability in the ZoomSounds WordPress plugin versions before 6.05. The vulnerability exists in a PHP file that fails to implement proper access controls, allowing remote attackers to upload malicious files anywhere on the web server without authentication. This critical flaw enables complete system compromise through remote code execution, with a CVSS score of 9.1 indicating severe impact. While specific KEV and EPSS data are not provided in the available intelligence, the combination of unauthenticated access (CVSS AV:N/PR:N), high impact to confidentiality and integrity, and the prevalence of WordPress plugin exploitation in the wild suggests this represents an actively exploited vulnerability in real-world deployments.

Technical Context

ZoomSounds is a WordPress audio player plugin distributed through the WordPress.org plugin repository. The vulnerability stems from inadequate input validation and access control in a PHP file handler, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). The root cause is the absence of authentication checks (PR:N in CVSS vector) combined with insufficient file type validation, allowing attackers to bypass WordPress security functions and upload executable PHP files. The attack vector is network-based (AV:N) with low complexity (AC:L), meaning no special conditions or user interaction is required. The CPE context would be: cpe:2.3:a:zoomsounds:zoomsounds:*:*:*:*:*:wordpress:*:* with version constraints <6.05. This affects any WordPress installation with the vulnerable plugin active, regardless of WordPress hardening.

Affected Products

ZoomSounds WordPress plugin versions prior to 6.05. Specifically affected versions include all releases from initial publication through version 6.04. The plugin is distributed via the official WordPress.org plugin repository and has been downloaded tens of thousands of times based on typical WordPress plugin adoption patterns. Any WordPress installation (all versions) running ZoomSounds <6.05 with the plugin active is vulnerable. Shared hosting environments and multisite WordPress installations are particularly at risk due to file system accessibility across multiple sites. No vendor advisory reference is provided in the available intelligence, but the vulnerability would have been disclosed to WordPress.org plugin team and catalogued in WordPress security databases.

Remediation

Immediate remediation steps: (1) Update ZoomSounds plugin to version 6.05 or later immediately through WordPress admin dashboard (Plugins > Updates) or manually via WordPress.org repository download, (2) After patching, audit the web server for suspicious uploaded files, particularly in wp-content/uploads and other world-writable directories, checking modification timestamps around vulnerability discovery dates, (3) Search web server logs for POST requests to the vulnerable PHP file endpoint with upload parameters to identify exploitation attempts, (4) If unable to update immediately, disable the ZoomSounds plugin entirely (Deactivate and Delete) until patching can be completed, (5) Implement Web Application Firewall (WAF) rules to block file upload requests to ZoomSounds plugin endpoints as temporary mitigation, (6) Consider restricting PHP execution in wp-content/uploads directory via .htaccess (AddType text/plain .php) to prevent execution of uploaded malicious files. No vendor advisory link is provided in available intelligence; refer to WordPress.org ZoomSounds plugin page and WPVULNDB for official patch confirmation.

Priority Score

66
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +46
POC: +20

Share

CVE-2021-4457 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy