The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
History

Tue, 12 Aug 2025 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Etoilewebdesign
Etoilewebdesign front End Users
CPEs cpe:2.3:a:etoilewebdesign:front_end_users:*:*:*:*:*:wordpress:*:*
Vendors & Products Etoilewebdesign
Etoilewebdesign front End Users

Wed, 02 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 02 Apr 2025 09:45:00 +0000

Type Values Removed Values Added
Description The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title Front-End-Only-Users <= 3.2.32 - Unauthenticated Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-04-02T09:21:42.633Z

Updated: 2025-04-02T16:14:39.009Z

Reserved: 2025-03-05T21:15:46.177Z

Link: CVE-2025-2005

cve-icon Vulnrichment

Updated: 2025-04-02T16:14:30.717Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-02T10:15:19.117

Modified: 2025-08-12T17:14:54.880

Link: CVE-2025-2005

cve-icon Redhat

No data.