Description
The Ebook Store plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ebook_store_save_form function in all versions up to, and including, 5.8012. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2025-07-24
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Ebook Store plugin for WordPress permits unauthenticated users to upload arbitrary files because it lacks file type validation, allowing an attacker to upload a malicious script that may be executed on the server. This flaw is a classic instance of unrestricted file upload (CWE‑434) and gives the attacker the ability to run code with the privileges of the web server process.

Affected Systems

All installations of the Ebook Store plugin by motovnet with versions up to and including 5.8012 are affected. The vulnerability resides in the ebook_store_save_form function and any WordPress site that has not applied a newer version is at risk. The plugin is typically used by e‑book retail or distribution sites.

Risk and Exploitability

The vulnerability scores a CVSS of 9.8, indicating critical severity. The EPSS score is less than 1 %, showing a very low but non‑zero exploitation probability, and it is not listed in the CISA KEV catalog. The attack vector is inferred as a web‑application path; an unauthenticated user can issue an HTTP request to the plugin’s upload endpoint and supply any file type. Because no validation occurs, malicious executable files can reach the server’s document root, after which they can be accessed or executed, leading to remote code execution.

Generated by OpenCVE AI on April 22, 2026 at 14:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Ebook Store plugin to version 5.8013 or later to apply the vendor’s fix for the file‑type validation bug.
  • Until a patch is applied, disable or delete the Ebook Store plugin from the WordPress installation, or block unauthenticated file uploads with .htaccess or a web‑application firewall.
  • Configure the web server or the plugin to allow only whitelisted MIME types for file uploads and ensure that any uploaded files are stored in a non‑executable directory.

Generated by OpenCVE AI on April 22, 2026 at 14:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-22477 The Ebook Store plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ebook_store_save_form function in all versions up to, and including, 5.8012. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
History

Thu, 24 Jul 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 24 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 24 Jul 2025 04:30:00 +0000

Type Values Removed Values Added
Description The Ebook Store plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ebook_store_save_form function in all versions up to, and including, 5.8012. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title Ebook Store <= 5.8012 - Unauthenticated Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:35:19.811Z

Reserved: 2025-07-10T16:51:50.723Z

Link: CVE-2025-7437

cve-icon Vulnrichment

Updated: 2025-07-24T13:35:03.536Z

cve-icon NVD

Status : Deferred

Published: 2025-07-24T07:15:54.740

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7437

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:45:19Z

Weaknesses