Description
The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that this requires the 'Private Message' module to be enabled and the Business version of the PRO software to be in use.
Published: 2025-06-05
Score: 8.8 High
EPSS: 1.5% Low
KEV: No
Impact: Arbitrary file upload with potential remote code execution
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the upload_files() function of the WP User Frontend Pro plugin, which fails to enforce file type validation. An authenticated user with Subscriber access or higher can upload any file to the server when the Private Message module is active and the Business edition of the PRO software is in use. Successful exploitation can lead to arbitrary code execution, allowing an attacker to compromise the entire WordPress installation, exfiltrate data, install backdoors, or disrupt services.

Affected Systems

The issue affects the WordPress plugin WP User Frontend Pro provided by WeDevs, versions 4.1.3 and earlier. Administrators who have deployed the Private Message module and are using the Business version of the plugin are at risk. The vulnerability applies only to installations that have at least Subscriber‐level user authentication configured, irrespective of the WordPress core version.

Risk and Exploitability

The moderate CVSS score of 8.8 indicates a high severity vulnerability. The EPSS score of 1% suggests a low to moderate probability that the flaw will be actively exploited, and the vulnerability is not currently listed in the CISA KEV catalog. Attacks would require legitimate user credentials and the appropriate module configuration, mitigating the risk of widespread, automated exploitation, but still representing a significant threat to any affected site.

Generated by OpenCVE AI on April 21, 2026 at 20:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update WP User Frontend Pro to version 4.1.4 or newer
  • Disable the Private Message module if the Business edition is not required
  • Restrict Publisher and higher administrative roles to trusted users only

Generated by OpenCVE AI on April 21, 2026 at 20:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-16962 The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that this requires the 'Private Message' module to be enabled and the Business version of the PRO software to be in use.
History

Thu, 05 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Jun 2025 05:45:00 +0000

Type Values Removed Values Added
Description The WP User Frontend Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload_files() function in all versions up to, and including, 4.1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Please note that this requires the 'Private Message' module to be enabled and the Business version of the PRO software to be in use.
Title WP User Frontend Pro <= 4.1.3 - Authenticated (Subscriber+) Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:10:42.803Z

Reserved: 2025-03-31T19:17:08.251Z

Link: CVE-2025-3054

cve-icon Vulnrichment

Updated: 2025-06-05T13:18:36.651Z

cve-icon NVD

Status : Deferred

Published: 2025-06-05T06:15:25.833

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3054

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T20:30:27Z

Weaknesses