Description
The Crawlomatic Multipage Scraper Post Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the crawlomatic_generate_featured_image() function in all versions up to, and including, 2.6.8.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2025-05-17
Score: 9.8 Critical
EPSS: 2.6% Low
KEV: No
Impact: Arbitrary File Upload potentially leading to Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Crawlomatic Multipage Scraper Post Generator plugin for WordPress suffers from a missing file type validation in the crawlomatic_generate_featured_image() function, a flaw classified as CWE-434, permitting any file to be uploaded via an unauthenticated request. This omission enables an attacker to place files such as PHP scripts on the server. The description states that this could permit remote code execution after upload, meaning the attacker could then navigate to the uploaded artifact to run arbitrary code.

Affected Systems

All versions of the plugin up to and including 2.6.8.1 are affected. The vendor is CodeRevolution, and the product is the Crawlomatic Multipage Scraper Post Generator for WordPress. No other vendors are listed as impacted.

Risk and Exploitability

The CVSS score of 9.8 signals a critical severity and the EPSS score of 2.565% indicates a moderate exploitation likelihood. The vulnerability is not present in CISA’s KEV catalog. Because the flaw allows unauthenticated uploads without file type checks, an attacker can exploit the endpoint, upload a malicious script, and then trigger execution through the web server, potentially compromising the entire WordPress site.

Generated by OpenCVE AI on April 28, 2026 at 18:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Crawlomatic Multipage Scraper Post Generator plugin to a version where file type validation has been added.
  • If an upgrade is not immediately possible, restrict the plugin’s upload capabilities by configuring WordPress to allow only safe file types and preventing executable files from being stored in the uploads directory (e.g., by adjusting MIME type whitelisting).
  • If the plugin is not required, uninstall it to eliminate the vulnerability.
  • Implement explicit file type validation rules for uploads, following CWE‑434 best practices, to reject non‑image files and disallow executables.

Generated by OpenCVE AI on April 28, 2026 at 18:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15567 The Crawlomatic Multipage Scraper Post Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the crawlomatic_generate_featured_image() function in all versions up to, and including, 2.6.8.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
History

Mon, 19 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 17 May 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Crawlomatic Multipage Scraper Post Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the crawlomatic_generate_featured_image() function in all versions up to, and including, 2.6.8.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title Crawlomatic Multipage Scraper Post Generator <= 2.6.8.1 - Unauthenticated Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:26.068Z

Reserved: 2025-05-06T19:26:11.492Z

Link: CVE-2025-4389

cve-icon Vulnrichment

Updated: 2025-05-19T16:58:55.710Z

cve-icon NVD

Status : Deferred

Published: 2025-05-17T06:15:18.980

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4389

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:00:20Z

Weaknesses