Description
Unrestricted Upload of File with Dangerous Type vulnerability in Adrian Tobey Groundhogg groundhogg allows Upload a Web Shell to a Web Server.This issue affects Groundhogg: from n/a through <= 4.2.1.
Published: 2025-07-16
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in the Groundhogg WordPress plugin is an Unrestricted Upload of File with Dangerous Type, which permits uploading files such as web shells to the web server. This flaw, identified as CWE‑434, can lead to remote code execution if the attacker can place a malicious script on the server that is later interpreted by the application or the web server.

Affected Systems

Affected versions include all releases of the Groundhogg plugin up to and including 4.2.1, distributed by Adrian Tobey. The vulnerability exists in the plugin’s file upload functionality, allowing users to upload arbitrary files without proper type validation.

Risk and Exploitability

With a CVSS score of 9.1 the flaw is high severity, though the EPSS score is under 1 % and it is not listed in CISA’s KEV catalog. Attackers would need to interact with the plugin’s upload interface, which is likely accessible only to authenticated users; based on the description it is inferred that the upload is restricted to authenticated users, but the low probability of exploitation is offset by the potential for total compromise once a web shell is in place.

Generated by OpenCVE AI on April 30, 2026 at 16:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Groundhogg version 4.2.2 or later, which fixes the upload validation.
  • If immediate upgrade is not possible, block or disable the plugin’s upload feature and restrict uploaded file types to safe extensions at the web‑server level.
  • Deploy a web application firewall or intrusion detection system to monitor for and reject dangerous file uploads.

Generated by OpenCVE AI on April 30, 2026 at 16:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21623 Unrestricted Upload of File with Dangerous Type vulnerability in Adrian Tobey Groundhogg allows Upload a Web Shell to a Web Server. This issue affects Groundhogg: from n/a through 4.2.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Adrian Tobey Groundhogg allows Upload a Web Shell to a Web Server. This issue affects Groundhogg: from n/a through 4.2.1. Unrestricted Upload of File with Dangerous Type vulnerability in Adrian Tobey Groundhogg groundhogg allows Upload a Web Shell to a Web Server.This issue affects Groundhogg: from n/a through <= 4.2.1.
Title WordPress Groundhogg <= 4.2.1 - Arbitrary File Upload Vulnerability WordPress Groundhogg plugin <= 4.2.1 - Arbitrary File Upload vulnerability
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Wed, 16 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00039}


Wed, 16 Jul 2025 11:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in Adrian Tobey Groundhogg allows Upload a Web Shell to a Web Server. This issue affects Groundhogg: from n/a through 4.2.1.
Title WordPress Groundhogg <= 4.2.1 - Arbitrary File Upload Vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Groundhogg Groundhogg
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:55.732Z

Reserved: 2025-05-19T14:13:37.940Z

Link: CVE-2025-48300

cve-icon Vulnrichment

Updated: 2025-07-16T14:09:57.573Z

cve-icon NVD

Status : Deferred

Published: 2025-07-16T12:15:27.207

Modified: 2026-04-23T15:31:03.707

Link: CVE-2025-48300

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T16:45:26Z

Weaknesses