CVE-2025-6058 Scanner

CVE-2025-6058 Scanner - Arbitrary File Upload vulnerability in WPBookit

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

18 days

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

The WPBookit plugin for WordPress is widely utilized by businesses and individuals to manage bookings and appointments effectively. It offers a range of features to facilitate booking management, making it a popular choice for WordPress users. Typically used by small business owners and freelancers, WPBookit simplifies the scheduling process for various services. The plugin integrates seamlessly with WordPress, allowing users to handle their bookings through their websites. It acts as a tool to streamline appointments, helping businesses maintain organized and efficient scheduling. However, due to its popularity, WPBookit is often a target for vulnerabilities, making security a critical concern.

The Arbitrary File Upload vulnerability in WPBookit allows attackers to upload files without any restrictions or validation on the type of files being uploaded. The lack of appropriate file upload controls can lead to severe security breaches. Attackers can potentially upload malicious scripts that execute arbitrary code on the server. The vulnerability exists in the image_upload_handle() function, where file type validation is missing. This security flaw compromises the integrity of the site by enabling unauthorized file handling. Unauthenticated users can potentially exploit this to gain control over the server or extract sensitive information.

The vulnerability can usually be exploited through the 'add_booking_type' route, accessed via the admin-ajax.php endpoint in WordPress. The POST request allows an attacker to upload a script file using the cover_image_img parameter without validation for file type. Attackers manipulate the HTTP content to deploy a specially crafted PHP script designed to execute commands server-side. This exploit targets the image upload functionality, commonly found in the backend. The execution of the script once uploaded can lead to remote code execution (RCE). Successful exploitation could allow an attacker to execute arbitrary code in the context of the WordPress server.

If this vulnerability is actively exploited, attackers may achieve remote code execution, leading to a takeover of the vulnerable site. Malicious actors can upload backdoors or ransomware, compromising site security. Such breaches can lead to data theft, loss of sensitive information, or even physical damages if business operations are disrupted due to the website downtime. Exploitation could also result in defacement, damaging the organization's reputation and leading to a loss of user trust. Affected websites might be blacklisted by security companies, further affecting the site's SEO and user accessibility.

REFERENCES

Get started to protecting your digital assets