Description
The Make Connector plugin for WordPress is vulnerable to arbitrary file uploads due to misconfigured file type validation in the 'upload_media' function in all versions up to, and including, 1.5.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2025-09-04
Score: 7.2 High
EPSS: 1.0% Low
KEV: No
Impact: Remote Code Execution via arbitrary file upload
Action: Immediate Patch
AI Analysis

Impact

The Make Connector plugin for WordPress allows authenticated users with Administrator level or higher to upload arbitrary files because the plugin's file type validation in the upload_media function is misconfigured. This flaw can be leveraged to place malicious scripts on the site, potentially giving an attacker the ability to execute code on the web server. The vulnerability is identified as CWE-434, representing unsafe file uploads.

Affected Systems

Any WordPress site running the Integromat Make Connector plugin version 1.5.10 or earlier is affected. Administrators or users with equivalent privileges on those installations can exploit the flaw.

Risk and Exploitability

The CVSS score of 7.2 reflects a moderate to high risk, and the EPSS score of 1% indicates a low but non-zero probability of exploitation. Since the attack requires Administrator or higher credentials, the threat is limited to privileged users, but the ability to upload code gives attackers a powerful vector for remote code execution. The vulnerability is not currently listed in the CISA KEV catalog.

Generated by OpenCVE AI on April 20, 2026 at 21:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Make Connector plugin to a version newer than 1.5.10 where the file validation flaw has been fixed.
  • If an immediate upgrade is not possible, configure WordPress or the server to disallow execution of uploaded files in the plugin's upload directory (for example, by adding an .htaccess rule that blocks PHP execution).
  • Reduce the number of users with Administrator or equivalent rights and enforce least‑privilege policies to limit the pool of accounts that can trigger the flaw.

Generated by OpenCVE AI on April 20, 2026 at 21:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-26725 The Make Connector plugin for WordPress is vulnerable to arbitrary file uploads due to misconfigured file type validation in the 'upload_media' function in all versions up to, and including, 1.5.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
History

Wed, 08 Apr 2026 18:30:00 +0000


Mon, 22 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Celonis
Celonis make Connector
CPEs cpe:2.3:a:celonis:make_connector:*:*:*:*:*:wordpress:*:*
Vendors & Products Celonis
Celonis make Connector

Thu, 04 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 04 Sep 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 04 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
Description The Make Connector plugin for WordPress is vulnerable to arbitrary file uploads due to misconfigured file type validation in the 'upload_media' function in all versions up to, and including, 1.5.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title Make Connector <= 1.5.10 - Authenticated (Administrator+) Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Celonis Make Connector
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:20:50.394Z

Reserved: 2025-06-13T22:50:49.868Z

Link: CVE-2025-6085

cve-icon Vulnrichment

Updated: 2025-09-04T15:04:11.582Z

cve-icon NVD

Status : Modified

Published: 2025-09-04T10:42:33.787

Modified: 2026-04-08T19:24:26.337

Link: CVE-2025-6085

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:00:11Z

Weaknesses