Impact
The WordPress Automatic Plugin is vulnerable to arbitrary file uploads due to insufficient file type validation in the core.php file. Authenticated attackers of Author level or higher can upload any file, which may result in remote code execution. This weakness is identified as CWE-434, highlighting a lack of proper file type verification.
Affected Systems
The vulnerability affects ValvePress WordPress Automatic Plugin versions up to and including 3.115.0. It applies to any WordPress site that has this plugin installed and running the listed versions.
Risk and Exploitability
With a CVSS score of 8.8, the vulnerability is considered high severity. The EPSS score of 1% indicates a low but non‑zero probability that it will be exploited before a patch is applied. The acceptance of the KEV status confirms it is not a widely documented exploitation scenario yet. The attack requires valid Author‑level credentials; once authenticated, the attacker can upload malicious files and potentially execute code on the server.
OpenCVE Enrichment
EUVD