Description
The KiotViet Sync plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the create_media() function in all versions up to, and including, 1.8.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2025-11-05
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via Arbitrary File Upload
Action: Immediate Patch
AI Analysis

Impact

The KiotViet Sync plugin for WordPress allows unauthenticated users to upload any file because the create_media() function lacks file type validation. An attacker can place malicious code on the server, potentially leading to full remote code execution. The weakness is a classic arbitrary file upload flaw (CWE-434).

Affected Systems

All installations of the KiotViet Sync plugin from mykiot up to version 1.8.5 are vulnerable. This includes 1.8.5 and every lower release of the plugin distributed via WordPress.

Risk and Exploitability

The CVSS score of 9.8 marks this as critical, and although the EPSS score is currently below 1%, the lack of any mitigation makes exploitation straightforward for anyone who can send an HTTP request to the vulnerable endpoint. The vulnerability is not listed in CISA’s KEV catalog, but its impact is significant due to the potential for remote code execution. Attackers do not need authentication; they can simply send a crafted upload request to the server. Given the high severity and the complete absence of defensive controls, organizations should treat this as an urgent incident.

Generated by OpenCVE AI on April 21, 2026 at 18:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of KiotViet Sync that removes the file type validation bug; if unavailable, disable or delete the plugin from the site.
  • Configure the upload handler to allow only safe file types (e.g., images, PDFs) and reject all others through code or plugin settings.
  • Add server‑side restrictions—such as an .htaccess rule or web.config directive—to block execution of files in the upload directory, ensuring that even if malicious files are uploaded, they cannot be executed.

Generated by OpenCVE AI on April 21, 2026 at 18:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 05 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 05 Nov 2025 07:45:00 +0000

Type Values Removed Values Added
Description The KiotViet Sync plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the create_media() function in all versions up to, and including, 1.8.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title KiotViet Sync <= 1.8.5 - Unauthenticated Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:03:27.512Z

Reserved: 2025-11-03T21:55:51.278Z

Link: CVE-2025-12674

cve-icon Vulnrichment

Updated: 2025-11-05T14:21:03.098Z

cve-icon NVD

Status : Deferred

Published: 2025-11-05T08:15:33.313

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12674

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:45:06Z

Weaknesses