Description
Unrestricted Upload of File with Dangerous Type vulnerability in Scriptonite user files user-files allows Upload a Web Shell to a Web Server.This issue affects user files: from n/a through <= 2.4.2.
Published: 2025-01-22
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Scriptonite User Files exposes an unrestricted file upload flaw that allows an attacker to place a web shell on the target web server. By uploading a file of a dangerous type, the attacker can embed executable PHP or other code, effectively gaining remote code execution capability. The weakness is categorized as CWE-434, indicating that the application does not verify or restrict the MIME type or extension of uploaded files, thereby compromising confidentiality, integrity, and availability for the entire site.

Affected Systems

Any WordPress installation running the Scriptonite User Files plugin version 2.4.2 or older is affected. The vulnerability applies to all releases from the earliest available version through 2.4.2.

Risk and Exploitability

The severity is highest, with a CVSS score of 10. The EPSS score of less than 1% suggests that widespread exploitation is currently unlikely, and the vulnerability is not listed in the CISA KEV catalog. However, the flaw remains exploitable through the plugin’s upload interface, which is accessible to authenticated or unauthenticated users depending on configuration. An attacker who can reach the upload form can inject a web shell that once executed, allows full control over the server.

Generated by OpenCVE AI on May 2, 2026 at 05:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WordPress User Files plugin to a newer release that removes the unrestricted upload capability.
  • If the plugin is not required, uninstall or disable it entirely to eliminate the attack surface.
  • Until a patch is applied, restrict the upload feature by disabling the upload form, configuring the server to disallow execution of files in the upload directory, and monitoring the upload directory for any unauthorized files.

Generated by OpenCVE AI on May 2, 2026 at 05:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3565 Unrestricted Upload of File with Dangerous Type vulnerability in Innovative Solutions user files allows Upload a Web Shell to a Web Server. This issue affects user files: from n/a through 2.4.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Innovative Solutions user files allows Upload a Web Shell to a Web Server. This issue affects user files: from n/a through 2.4.2. Unrestricted Upload of File with Dangerous Type vulnerability in Scriptonite user files user-files allows Upload a Web Shell to a Web Server.This issue affects user files: from n/a through <= 2.4.2.
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Wed, 22 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Jan 2025 14:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Innovative Solutions user files allows Upload a Web Shell to a Web Server. This issue affects user files: from n/a through 2.4.2.
Title WordPress user files plugin <= 2.4.2 - Arbitrary File Upload vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Innovative Solutions User Files Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-05-11T23:03:10.492Z

Reserved: 2025-01-16T11:32:55.399Z

Link: CVE-2025-23953

cve-icon Vulnrichment

Updated: 2025-01-22T15:23:39.324Z

cve-icon NVD

Status : Deferred

Published: 2025-01-22T15:15:26.670

Modified: 2026-04-23T15:24:50.923

Link: CVE-2025-23953

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T05:45:20Z

Weaknesses