CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3DescriptionNVD
The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that this requires the 'Private Message' module to be enabled and the Business version of the PRO software to be in use.
AnalysisAI
WP User Frontend Pro plugin for WordPress versions up to 4.1.3 contains an arbitrary file upload vulnerability in the upload_files() function due to missing file type validation, allowing authenticated Subscriber-level users to upload malicious files and achieve remote code execution. This vulnerability is particularly dangerous because it requires only Subscriber-level privileges (the lowest authenticated role in WordPress) and no user interaction, making it a high-severity post-authentication attack vector. The vulnerability is conditional on the Private Message module being enabled and requires the Business version of the PRO software.
Technical ContextAI
The vulnerability resides in the WP User Frontend Pro WordPress plugin (CPE: wp:wp_user_frontend_pro or wordpress:wp_user_frontend_pro), specifically in the upload_files() function which handles file uploads for the Private Message module. The root cause is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), a well-known file upload validation weakness. The plugin fails to properly validate file types before persisting uploaded files to the server, allowing attackers to bypass WordPress's typical file upload restrictions. This is particularly critical in WordPress environments where uploaded files landing in the web-accessible directory (typically wp-content/uploads/) can be directly executed as PHP code if the web server is configured to parse PHP in that directory. The Private Message module specifically handles file attachments, making it the attack surface for this vulnerability.
RemediationAI
Immediate actions: (1) Update WP User Frontend Pro to version 4.1.4 or later when available (patch version not specified in description; contact vendor for availability); (2) If immediate patching is not possible, disable the Private Message module in WP User Frontend Pro settings until patched; (3) Restrict Subscriber role upload capabilities via WordPress role/capability plugins (e.g., User Role Editor) to minimize attack surface; (4) Implement file upload restrictions at the web server level (e.g., mod_rewrite rules preventing PHP execution in wp-content/uploads/); (5) Review user accounts with Subscriber or higher roles and remove unnecessary accounts; (6) Monitor uploads directory for suspicious files (PHP, shell scripts, executables). Vendor advisory: Check WP User Frontend official plugin repository and security advisories for patch version 4.1.4+. Long-term: Implement Web Application Firewall (WAF) rules to detect polyglot or double-extension file uploads; enforce strict MIME type validation both client and server-side.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-16962