CVE-2025-2941

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to move arbitrary files on WordPress servers running the vulnerable Drag and Drop Multiple File Upload for WooCommerce plugin. By exploiting insufficient path validation, attackers can relocate critical files like wp-config.php, potentially leading to remote code execution. All WordPress sites using this plugin up to version 1.1.4 are affected.

💻 Affected Systems

Products:
  • Drag and Drop Multiple File Upload for WooCommerce WordPress plugin
Versions: All versions up to and including 1.1.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WooCommerce to be installed, but vulnerability exists in plugin itself.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server compromise, data theft, and website defacement.

🟠

Likely Case

File manipulation leading to configuration exposure, privilege escalation, or denial of service.

🟢

If Mitigated

Limited impact if file permissions restrict movement or web server runs with minimal privileges.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation makes internet-facing WordPress sites immediate targets.
🏢 Internal Only: MEDIUM - Internal systems still vulnerable but require network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request manipulation required. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.5

Vendor Advisory: https://wordpress.org/plugins/drag-and-drop-multiple-file-upload-for-woocommerce/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Drag and Drop Multiple File Upload for WooCommerce'. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 1.1.5+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched

wp plugin deactivate drag-and-drop-multiple-file-upload-for-woocommerce

Restrict file permissions

linux

Set restrictive permissions on wp-config.php and other sensitive files

chmod 400 wp-config.php
chown root:root wp-config.php

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests containing 'wc-upload-file[]' parameter
  • Disable the plugin entirely and use alternative file upload solutions

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 1.1.4 or lower, you are vulnerable.

Check Version:

wp plugin get drag-and-drop-multiple-file-upload-for-woocommerce --field=version

Verify Fix Applied:

Confirm plugin version shows 1.1.5 or higher after update. Test file upload functionality still works normally.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing 'wc-upload-file[]' parameter with suspicious file paths
  • File modification events on wp-config.php or other sensitive files

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with file movement parameters
  • Unusual file upload patterns

SIEM Query:

source="web_logs" AND (uri_path="/wp-admin/admin-ajax.php" AND params CONTAINS "wc-upload-file")

🔗 References

📤 Share & Export