Description
Unrestricted Upload of File with Dangerous Type vulnerability in STAGGS STAGGS staggs allows Upload a Web Shell to a Web Server.This issue affects STAGGS: from n/a through <= 2.11.0.
Published: 2025-05-23
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The studied flaw allows an attacker to upload any file, including executable shell scripts, due to the lack of type validation in the STAGGS plugin. Once a malicious file such as a web shell is placed on the server, the attacker can run arbitrary commands, thereby compromising confidentiality, integrity, and availability of the entire web application. This weakness is identified as CWE‑434.

Affected Systems

The vulnerability impacts the WordPress STAGGS plugin, versions up through and including 2.11.0. All sites using any of those releases are potentially exposed.

Risk and Exploitability

The CVSS score of 10 marks the issue as critical, while the EPSS score of less than 1% indicates a low, yet non‑zero probability of exploitation. The flaw is not listed in the CISA KEV catalog. Attackers would likely exploit the upload interface provided by the plugin, a path that requires at least some level of site access; the description does not specify whether public or authenticated access is sufficient, so this remains an inference. Successful exploitation would grant full server control via an uploaded web shell.

Generated by OpenCVE AI on April 30, 2026 at 12:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the STAGGS plugin to version 2.12.0 or later, which removes the unsafe upload functionality.
  • In the absence of an immediate upgrade, disable the plugin’s file upload feature and remove any existing upload directories.
  • Implement application‑level file‑type validation and only allow approved mime types or extensions.
  • Deploy a web application firewall or similar filtering solution to block the execution of uploaded scripts.
  • Audit site logs for unexpected uploads and anomalous activity, and consider tightening user role permissions to limit who can perform uploads.

Generated by OpenCVE AI on April 30, 2026 at 12:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28106 Unrestricted Upload of File with Dangerous Type vulnerability in STAGGS STAGGS allows Upload a Web Shell to a Web Server. This issue affects STAGGS: from n/a through 2.11.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in STAGGS STAGGS allows Upload a Web Shell to a Web Server. This issue affects STAGGS: from n/a through 2.11.0. Unrestricted Upload of File with Dangerous Type vulnerability in STAGGS STAGGS staggs allows Upload a Web Shell to a Web Server.This issue affects STAGGS: from n/a through <= 2.11.0.
Title WordPress STAGGS <= 2.11.0 - Arbitrary File Upload Vulnerability WordPress STAGGS plugin <= 2.11.0 - Arbitrary File Upload Vulnerability
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Fri, 23 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 23 May 2025 13:00:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in STAGGS STAGGS allows Upload a Web Shell to a Web Server. This issue affects STAGGS: from n/a through 2.11.0.
Title WordPress STAGGS <= 2.11.0 - Arbitrary File Upload Vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:47.895Z

Reserved: 2025-05-07T10:45:05.652Z

Link: CVE-2025-47637

cve-icon Vulnrichment

Updated: 2025-05-23T15:24:46.639Z

cve-icon NVD

Status : Deferred

Published: 2025-05-23T13:15:41.310

Modified: 2026-04-23T15:30:39.333

Link: CVE-2025-47637

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T12:30:16Z

Weaknesses