Description
The Flex QR Code Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in thesave_qr_code_to_db() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2025-10-15
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Upload leading to Remote Code Execution
Action: Patch Now
AI Analysis

Impact

The Flex QR Code Generator plugin for WordPress is vulnerable to arbitrary file uploads because the save_qr_code_to_db() function does not validate file types before storing them. An attacker can submit any file via the plugin’s upload interface, and because no authentication is required, this can lead to remote code execution if a malicious script is uploaded and executed on the server. The vulnerability is a classic server‑side file upload flaw (CWE‑434).

Affected Systems

The affected vendor is Ajitdas, whose Flex QR Code Generator WordPress plugin, all releases up to and including version 1.2.5, is impacted. Any WordPress site that has this plugin installed and has not applied the newer version is vulnerable.

Risk and Exploitability

The CVSS score of 9.8 marks this flaw as critical. The EPSS score of less than 1 % indicates that, at present, the probability of exploitation is low, but the potential impact is severe: an unauthenticated attacker could gain file‑write privileges and possibly execute code. The vulnerability is not listed in CISA’s KEV catalog. Attackers would likely exploit the upload endpoint by sending a crafted payload, possibly a PHP file, to achieve remote code execution.

Generated by OpenCVE AI on April 22, 2026 at 13:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch for Flex QR Code Generator (v1.2.6 or later).
  • If a patch is not available, deactivate or delete the plugin until an update is released.
  • If the plugin remains operational, configure the web server to block execution of newly uploaded files (for example, limit file types or deny PHP execution in the upload directory).

Generated by OpenCVE AI on April 22, 2026 at 13:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:45:00 +0000


Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 15 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Flex QR Code Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in thesave_qr_code_to_db() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title Flex QR Code Generator <= 1.2.5 - Unauthenticated Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:48:20.408Z

Reserved: 2025-09-05T17:45:14.781Z

Link: CVE-2025-10041

cve-icon Vulnrichment

Updated: 2025-10-15T19:45:09.427Z

cve-icon NVD

Status : Deferred

Published: 2025-10-15T09:15:36.380

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10041

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T13:15:17Z

Weaknesses