Impact
The WP3D Model Import Viewer plugin for WordPress allows authenticated users with Author-level access or higher to upload arbitrary files due to missing file‑type validation, a vulnerability classified as CWE‑434: Unvalidated File Type. This flaw can be exploited to place malicious files on the server, which may enable remote code execution or other destructive actions against the affected site.
Affected Systems
WordPress sites running the WP3D Model Import Viewer plugin, versions up to and including 1.0.7.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.8, indicating high severity, while the EPSS score is below 1%, suggesting the likelihood of exploitation is low but non‑zero. It is not listed in the CISA KEV catalog. Attackers need only authenticated Author‑level or higher credentials to exploit the flaw, after which uploaded files could be executed or used to compromise the server.
OpenCVE Enrichment