CVE-2025-6586

The Download Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the dpwap_plugin_locInstall function in all versions up to, and including, 2.2.8. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Configurations

Configuration 1 (hide)

cpe:2.3:a:metagauss:download_plugin:*:*:*:*:*:wordpress:*:*

History

09 Jul 2025, 17:50

Type Values Removed Values Added
CPE cpe:2.3:a:metagauss:download_plugin:*:*:*:*:*:wordpress:*:*
References () https://plugins.trac.wordpress.org/browser/download-plugin/tags/2.2.8/app/Plugins/Dpwapuploader.php#L300 - () https://plugins.trac.wordpress.org/browser/download-plugin/tags/2.2.8/app/Plugins/Dpwapuploader.php#L300 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/37734c25-cce3-41fb-babf-714ba7a4bced?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/37734c25-cce3-41fb-babf-714ba7a4bced?source=cve - Third Party Advisory
First Time Metagauss
Metagauss download Plugin

08 Jul 2025, 16:18

Type Values Removed Values Added
Summary
  • (es) El complemento Download Plugin para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validación del tipo de archivo en la función dpwap_plugin_locInstall en todas las versiones hasta la 2.2.8 incluida. Esto permite que atacantes autenticados, con acceso de administrador o superior, carguen archivos arbitrarios en el servidor del sitio afectado, lo que podría posibilitar la ejecución remota de código.

04 Jul 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-04 03:15

Updated : 2025-07-09 17:50


NVD link : CVE-2025-6586

Mitre link : CVE-2025-6586

CVE.ORG link : CVE-2025-6586


JSON object : View

Products Affected

metagauss

  • download_plugin
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type