CVE-2025-6423 PUBLISHED

BeeTeam368 Extensions <= 2.3.5 - Authenticated (Subscriber+) Arbitrary File Upload

Assigner: Wordfence
Reserved: 20.06.2025 Published: 12.07.2025 Updated: 14.07.2025

The BeeTeam368 Extensions plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_submit_upload_file() function in all versions up to, and including, 2.3.5. This makes it possible for authenticated attackers with Subscriber-level access or higher to upload arbitrary files on the affected site's server which may make remote code execution possible.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor beeteam368
Product BeeTeam368 Extensions
Versions Default: unaffected
  • affected from * to 2.3.5 (incl.)

Credits

  • Marco Wotschka finder

References

Problem Types

  • CWE-434 Unrestricted Upload of File with Dangerous Type CWE