Description
Unrestricted Upload of File with Dangerous Type vulnerability in mojoomla WPAMS apartment-management allows Upload a Web Shell to a Web Server.This issue affects WPAMS: from n/a through <= 44.0 (17-08-2023).
Published: 2025-05-19
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WPAMS apartment‑management plugin contains an unrestricted file upload flaw that allows an attacker to upload a file with a dangerous type, such as a web shell. The CVE description states the upload is unrestricted, but it does not explicitly indicate whether authentication is required. Based on common WordPress plugin behavior, it is inferred that the vulnerable endpoint is reachable from the admin interface, allowing users with administrative privileges to exploit the flaw. The flaw is categorized as CWE‑434 and permits the attacker to execute arbitrary code on the hosting web server, compromising confidentiality, integrity, and availability.

Affected Systems

The vulnerability affects the WPAMS plugin by Mojoomla on WordPress sites. All releases from the initial version up to and including 44.0, released on 17‑08‑2023, are impacted. The plugin is commonly installed on residential and commercial real‑estate websites that manage apartment listings.

Risk and Exploitability

The CVSS score of 10 indicates a severe risk. The EPSS score is reported as < 1%, meaning the probability of exploitation is low but not zero. The likely attack vector is uploading a malicious file through the exposed file upload endpoint via the WordPress admin interface. Because the flaw is in a third‑party plugin and not patched by the core platform, successful exploitation leads to full control of the server. The vulnerability is currently not listed in CISA KEV, but the high CVSS and remote code execution potential warrant immediate attention.

Generated by OpenCVE AI on May 1, 2026 at 08:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WPAMS to the latest available version (≥ 45.0) if the update exists.
  • If upgrading is not immediately possible, disable or restrict the file‑upload feature and configure the server to deny execution of files in the upload directory.
  • Monitor the web server and application logs for attempts to upload files with dangerous extensions or suspicious content.

Generated by OpenCVE AI on May 1, 2026 at 08:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15767 Unrestricted Upload of File with Dangerous Type vulnerability in mojoomla WPAMS allows Upload a Web Shell to a Web Server.This issue affects WPAMS: from n/a through 44.0 (17-08-2023).
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in mojoomla WPAMS allows Upload a Web Shell to a Web Server.This issue affects WPAMS: from n/a through 44.0 (17-08-2023). Unrestricted Upload of File with Dangerous Type vulnerability in mojoomla WPAMS apartment-management allows Upload a Web Shell to a Web Server.This issue affects WPAMS: from n/a through <= 44.0 (17-08-2023).
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Mon, 19 May 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 19 May 2025 19:30:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in mojoomla WPAMS allows Upload a Web Shell to a Web Server.This issue affects WPAMS: from n/a through 44.0 (17-08-2023).
Title WordPress WPAMS plugin <= 44.0 (17-08-2023) - Arbitrary File Upload vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Mojoomla Wpams Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-05-12T00:17:39.923Z

Reserved: 2025-04-16T06:22:51.799Z

Link: CVE-2025-39401

cve-icon Vulnrichment

Updated: 2025-05-19T21:13:05.549Z

cve-icon NVD

Status : Deferred

Published: 2025-05-19T20:15:25.297

Modified: 2026-04-23T15:29:29.020

Link: CVE-2025-39401

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T08:30:12Z

Weaknesses