CVE-2025-6423

| EUVD-2025-21207 HIGH
2025-07-12 [email protected]
8.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 16, 2026 - 08:56 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 08:56 euvd
EUVD-2025-21207
CVE Published
Jul 12, 2025 - 08:15 nvd
HIGH 8.8

DescriptionNVD

The BeeTeam368 Extensions plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_submit_upload_file() function in all versions up to, and including, 2.3.5. This makes it possible for authenticated attackers with Subscriber-level access or higher to upload arbitrary files on the affected site's server which may make remote code execution possible.

AnalysisAI

A remote code execution vulnerability in all (CVSS 8.8). High severity vulnerability requiring prompt remediation.

Technical ContextAI

CWE-434 (Unrestricted File Upload). CVSS 8.8 indicates high severity. Affects all.

RemediationAI

Monitor vendor channels for patch availability.

Share

CVE-2025-6423 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy