CVE-2025-13069

8.8 HIGH

📋 TL;DR

The Enable SVG, WebP, and ICO Upload WordPress plugin allows authenticated attackers with author-level access or higher to upload arbitrary files due to insufficient ICO file validation. This vulnerability affects all versions up to 1.1.2 and could lead to remote code execution on vulnerable WordPress sites.

💻 Affected Systems

Products:
  • Enable SVG, WebP, and ICO Upload WordPress plugin
Versions: All versions up to and including 1.1.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with plugin enabled and at least one author-level user account.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server compromise, data theft, malware distribution, or site defacement.

🟠

Likely Case

Unauthorized file upload leading to webshell installation, backdoor persistence, or limited server access.

🟢

If Mitigated

Attackers can upload malicious files but execution is prevented by proper file permissions and security controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires author-level WordPress credentials. Attack involves uploading files with double extensions containing ICO magic bytes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.3 or later

Vendor Advisory: https://wordpress.org/plugins/enable-svg-webp-ico-upload/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Enable SVG, WebP, and ICO Upload'. 4. Click 'Update Now' if available, or manually update to version 1.1.3+. 5. Verify plugin is active and functioning.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched

wp plugin deactivate enable-svg-webp-ico-upload

Restrict file uploads

linux

Use .htaccess or web server config to block uploads of suspicious file types

Add to .htaccess: <FilesMatch "\.(php|phtml|php3|php4|php5|php7|phps|phar|inc|pl|py|cgi|sh|bash|exe|dll|bat|cmd|js|jsp|asp|aspx)">
    Order Allow,Deny
    Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Remove author-level access from untrusted users
  • Implement web application firewall rules to block file uploads with double extensions

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Enable SVG, WebP, and ICO Upload' version 1.1.2 or lower

Check Version:

wp plugin get enable-svg-webp-ico-upload --field=version

Verify Fix Applied:

Verify plugin version is 1.1.3 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed/successful file upload attempts by author-level users
  • Uploads of files with double extensions (.ico.php, .ico.jpg)

Network Indicators:

  • POST requests to /wp-admin/async-upload.php with ICO magic bytes in payload

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/async-upload.php" OR uri_path="/wp-admin/media-upload.php") AND http_method="POST" AND (file_extension="ico" OR content_type="image/x-icon")

🔗 References

📤 Share & Export