Impact
WordPress Plugin WP Super Edit through version 2.5.4 allows arbitrary files to be uploaded without type validation. This flaw, classified as CWE-434 Unrestricted Upload of File with Dangerous Type, enables an attacker that can reach the filemanager upload endpoint to place executable code on the web server, leading to remote code execution and a full compromise of the affected site.
Affected Systems
The vulnerability affects WordPress sites running the WP Super Edit plugin version 2.5.4 or older. Any site that has installed or enabled this component and has the generic WordPress installation is potentially exposed, regardless of its content management or theme configuration.
Risk and Exploitability
The CVSS score of 9.3 signals a critically severe issue and, despite an unavailable EPSS score, the ease of uploading files indicates a high likelihood of exploitation in environments where the plugin is active. The vulnerability is not listed in the CISA KEV catalog, but the remote code execution potential remains a top priority. Attackers can achieve compromise by sending a crafted upload request through the plugin’s filemanager endpoint, typically after authenticating as an administrator or exploiting a bypass that permits unauthenticated uploads.
OpenCVE Enrichment