CVE-2025-3616

8.8 HIGH

📋 TL;DR

The Greenshift WordPress plugin versions 11.4 to 11.4.5 contain a vulnerability that allows authenticated users with Subscriber-level access or higher to upload arbitrary files due to missing file type validation. This can lead to remote code execution on affected WordPress sites. The vulnerability was partially patched in version 11.4.5 and fully fixed in 11.4.6 with proper capability checks.

💻 Affected Systems

Products:
  • Greenshift – animation and page builder blocks WordPress plugin
Versions: 11.4 to 11.4.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Subscriber-level authentication is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers achieve remote code execution, gain full control of the WordPress server, and potentially compromise the entire hosting environment.

🟠

Likely Case

Attackers upload malicious PHP files, execute arbitrary code, deface websites, install backdoors, or steal sensitive data.

🟢

If Mitigated

With proper file upload restrictions and web application firewalls, attackers may only upload harmless files or be blocked entirely.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once credentials are obtained. CVSS 8.8 indicates high exploitability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.4.6

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3276168/greenshift-animation-and-page-builder-blocks/trunk/init.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Greenshift – animation and page builder blocks'. 4. Click 'Update Now' if available, or manually update to version 11.4.6 or later. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Greenshift plugin until patched

wp plugin deactivate greenshift-animation-and-page-builder-blocks

Restrict file uploads via .htaccess

linux

Block PHP file execution in upload directories

<FilesMatch "\.(php|php5|php7|phtml|phar)$">
    Order Allow,Deny
    Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Remove Subscriber role from all users or restrict file upload capabilities
  • Implement web application firewall rules to block malicious file upload patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Greenshift plugin version. If version is between 11.4 and 11.4.5 inclusive, the system is vulnerable.

Check Version:

wp plugin get greenshift-animation-and-page-builder-blocks --field=version

Verify Fix Applied:

Confirm plugin version is 11.4.6 or higher. Test file upload functionality with Subscriber account to ensure proper restrictions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to wp-content/uploads/greenshift/ directory
  • POST requests to /wp-json/greenshift/v1/proxy with file upload parameters
  • Execution of unexpected PHP files in upload directories

Network Indicators:

  • HTTP POST requests containing file uploads to WordPress REST API endpoints
  • Unusual outbound connections from WordPress server after file uploads

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-json/greenshift/v1/proxy" OR file_upload="true")

🔗 References

📤 Share & Export