Description
The Workreap plugin for WordPress, used by the Workreap - Freelance Marketplace WordPress Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'workreap_temp_upload_to_media' function in all versions up to, and including, 3.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2025-06-12
Score: 8.8 High
EPSS: 1.4% Low
KEV: No
Impact: Arbitrary File Upload leading to potential Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

The Workreap WordPress plugin contains a flaw in the workreap_temp_upload_to_media function where file type validation is omitted, allowing anyone with Subscriber-level or higher access to upload any file to the server. The lack of type checking enables attackers to place malicious PHP, scripts, or other executable files in the upload directory, creating a direct path to remote code execution if the server interprets the file or if the attacker can gain file execution rights through other flaws. This vulnerability specifically targets the upload workflow used by the Workreap freelancing marketplace theme and does not affect unauthenticated users. The risk is confined to the affected site and relies on the attacker’s ability to upload and then trigger execution of the file.

Affected Systems

Vendors affected are AmentoTech’s Workreap plugin for WordPress, versions up to and including 3.3.2. Administrators and users with Subscriber-level privileges or higher within the WordPress backend can exploit the flaw. All instances using the Workreap theme version 3.3.3 and later are not vulnerable, but any site still using 3.3.2 or earlier remains at risk.

Risk and Exploitability

The CVSS v3.1 score of 8.8 classifies this as High, reflecting high impact and a medium to high exploitation probability. An EPSS score of 1% indicates that, while exploitation is not rare, it is somewhat likely; the flaw is not currently listed in the CISA KEV catalog. The attack path requires authenticated access via WordPress, but once the file is uploaded the attacker can trigger execution by accessing the file directly or through a vulnerable script that reads uploaded content. Defensive records must monitor for unexpected files in the uploads directory and confirm that file permissions prevent execution.

Generated by OpenCVE AI on April 28, 2026 at 01:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Workreap to version 3.3.3 or later.
  • If an upgrade is unavailable, disable or restrict file uploads in the plugin settings and enforce strict MIME type validation to block non‑image files.
  • Modify the server’s uploads directory permissions to disallow script execution and configure the web server to serve uploads as static content only.

Generated by OpenCVE AI on April 28, 2026 at 01:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18160 The Workreap plugin for WordPress, used by the Workreap - Freelance Marketplace WordPress Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'workreap_temp_upload_to_media' function in all versions up to, and including, 3.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00264}

epss

{'score': 0.00305}


Thu, 10 Jul 2025 00:30:00 +0000

Type Values Removed Values Added
First Time appeared Amentotech
Amentotech workreap
CPEs cpe:2.3:a:amentotech:workreap:*:*:*:*:*:wordpress:*:*
Vendors & Products Amentotech
Amentotech workreap

Thu, 12 Jun 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Jun 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Workreap plugin for WordPress, used by the Workreap - Freelance Marketplace WordPress Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'workreap_temp_upload_to_media' function in all versions up to, and including, 3.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title Workreap <= 3.3.2 - Authenticated (Subscriber+) Arbitrary File Upload via 'workreap_temp_upload_to_media'
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Amentotech Workreap
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:37:37.246Z

Reserved: 2025-05-20T15:46:04.592Z

Link: CVE-2025-5012

cve-icon Vulnrichment

Updated: 2025-06-12T13:07:50.695Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-12T06:15:23.640

Modified: 2025-07-10T00:12:21.940

Link: CVE-2025-5012

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T01:30:17Z

Weaknesses