CVE-2025-32291

| EUVD-2025-17476 CRITICAL
2025-06-09 [email protected]
10.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17476
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
CVE Published
Jun 09, 2025 - 16:15 nvd
CRITICAL 10.0

Description

Unrestricted Upload of File with Dangerous Type vulnerability in FantasticPlugins SUMO Affiliates Pro allows Using Malicious Files. This issue affects SUMO Affiliates Pro: from n/a through 10.7.0.

Analysis

Critical unrestricted file upload vulnerability in FantasticPlugins SUMO Affiliates Pro (versions through 10.7.0) that allows unauthenticated attackers to upload malicious files with dangerous types, leading to complete system compromise. This CWE-434 vulnerability has a perfect CVSS 3.1 score of 10.0 due to network accessibility without authentication or user interaction, and affects all confidentiality, integrity, and availability properties. The vulnerability represents an immediate, easily exploitable threat to any WordPress installation running the affected plugin versions.

Technical Context

This vulnerability stems from improper input validation in the file upload mechanism of the SUMO Affiliates Pro WordPress plugin. CWE-434 (Unrestricted Upload of File with Dangerous Type) occurs when applications accept file uploads without proper verification of file types, extensions, or MIME types, allowing attackers to upload executable code (PHP, shell scripts, etc.) that the web server will process. The SUMO Affiliates Pro plugin, designed for affiliate program management, likely processes file uploads in its affiliate registration, document submission, or media management features without adequate server-side validation. The attack vector is Network (AV:N) with Low complexity (AC:L), no privilege requirements (PR:N), and no user interaction needed (UI:N), meaning the upload endpoint is directly accessible to anonymous users over HTTP/HTTPS. The Scope Change (S:C) indicates the vulnerability can impact resources beyond the vulnerable component, allowing lateral movement or privilege escalation within the WordPress ecosystem.

Affected Products

Affected Product: FantasticPlugins SUMO Affiliates Pro. Affected Versions: All versions from initial release through version 10.7.0 inclusive. CPE identifier would be: cpe:2.3:a:fantasticplugins:sumo_affiliates_pro:*:*:*:*:*:wordpress:*:*. This encompasses all prior releases and the current version 10.7.0. The vulnerability affects WordPress installations with the plugin enabled, regardless of WordPress version, as the vulnerability exists in plugin code rather than WordPress core. Specific vector: any web-accessible upload endpoint exposed by the plugin without proper authentication or file type validation.

Remediation

Immediate actions: (1) If patch version 10.7.1 or later is available from FantasticPlugins, update immediately via WordPress admin dashboard → Plugins → Update or directly from the vendor repository; (2) If no patch is available, disable and remove SUMO Affiliates Pro until patched ('Plugins' → 'Deactivate' → 'Delete'); (3) Implement temporary mitigation by adding firewall/WAF rules to block requests to known upload endpoints used by the plugin (typically wp-content/plugins/sumo-affiliates-pro/uploads/ or similar); (4) Review file upload directories for suspicious files created since plugin deployment (look for .php, .phtml, .php3, .php4, .php5 files in unexpected locations); (5) Check WordPress admin logs and access logs for upload POST requests from unfamiliar IP addresses. Long-term: monitor FantasticPlugins security advisories and enforce a policy of updating all WordPress plugins within 24-48 hours of patch release for critical vulnerabilities.

Priority Score

50
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +50
POC: 0

Share

CVE-2025-32291 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy