CVE-2025-6085
📋 TL;DR
The Make Connector WordPress plugin allows authenticated attackers with Administrator privileges to upload arbitrary files due to improper file type validation. This vulnerability can lead to remote code execution on affected WordPress sites. All versions up to and including 1.5.10 are vulnerable.
💻 Affected Systems
- Make Connector WordPress plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise via remote code execution, allowing attackers to install backdoors, steal data, or pivot to other systems.
Likely Case
Attackers upload web shells or malicious scripts to gain persistent access, deface websites, or deploy malware.
If Mitigated
Limited impact if file uploads are restricted by web server configurations or security plugins block execution.
🎯 Exploit Status
Exploitation requires Administrator credentials; public proof-of-concept code is available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5.11 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/integromat-connector/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Make Connector' plugin. 4. Click 'Update Now' if update available. 5. If no update, manually download version 1.5.11+ from WordPress.org and replace plugin files.
🔧 Temporary Workarounds
Disable plugin
allTemporarily deactivate the Make Connector plugin until patched.
wp plugin deactivate integromat-connector
Restrict file uploads via .htaccess
linuxBlock execution of uploaded files in WordPress uploads directory.
Add to .htaccess in wp-content/uploads: <FilesMatch "\.(php|phtml|php3|php4|php5|php7|phps|php8|inc|pl|py|jsp|asp|htm|html|shtml|sh|cgi)">
Order allow,deny
Deny from all
</FilesMatch>
🧯 If You Can't Patch
- Remove Administrator access from untrusted users
- Implement web application firewall rules to block suspicious file uploads
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Installed Plugins for Make Connector version 1.5.10 or lower.
Check Version:
wp plugin get integromat-connector --field=version
Verify Fix Applied:
Confirm plugin version is 1.5.11 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to wp-content/uploads via REST API endpoints
- POST requests to /wp-json/integromat/v1/upload_media with non-media file extensions
Network Indicators:
- HTTP POST requests containing PHP/executable files to WordPress REST API
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-json/integromat/v1/upload_media" AND file_extension IN ("php", "phtml", "exe", "sh"))
🔗 References
- https://github.com/d0n601/CVE-2025-6085
- https://plugins.trac.wordpress.org/browser/integromat-connector/trunk/class/class-rest-request.php#L24
- https://plugins.trac.wordpress.org/browser/integromat-connector/trunk/class/class-rest-request.php#L74
- https://plugins.trac.wordpress.org/browser/integromat-connector/trunk/class/class-rest-request.php#L90-95
- https://ryankozak.com/posts/cve-2025-6085/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/c53c322a-b197-4ece-ae4a-a3a86a009e4d?source=cve
- https://github.com/d0n601/CVE-2025-6085
- https://ryankozak.com/posts/cve-2025-6085/