CVE-2025-68001
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
Unrestricted Upload of File with Dangerous Type vulnerability in garidium g-FFL Checkout g-ffl-checkout allows Upload a Web Shell to a Web Server.This issue affects g-FFL Checkout: from n/a through <= 2.1.0.
Analysis
g-FFL Checkout WordPress plugin has an unrestricted file upload vulnerability allowing attackers to upload web shells for remote code execution.
Technical Context
The g-FFL Checkout plugin by garidium has a CWE-434 unrestricted file upload that accepts any file type, allowing PHP file uploads that function as web shells.
Affected Products
['garidium g-FFL Checkout WordPress plugin']
Remediation
Update the plugin immediately. Audit stored customer data for unauthorized access. This is especially sensitive due to firearms compliance requirements.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today