CVE-2025-69403

9.9 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious files to WordPress sites using the Bravis Addons plugin. It affects all WordPress installations running Bravis Addons version 1.1.9 or earlier. Attackers can exploit this to upload webshells or other malicious content.

💻 Affected Systems

Products:
  • Bravis Addons WordPress Plugin
Versions: All versions up to and including 1.1.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress sites with the Bravis Addons plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via webshell upload leading to data theft, ransomware deployment, or site defacement.

🟠

Likely Case

Website defacement, malware distribution, or backdoor installation for persistent access.

🟢

If Mitigated

Limited impact if file uploads are restricted to authenticated users only and file types are validated.

🌐 Internet-Facing: HIGH - WordPress sites are typically internet-facing and this vulnerability requires no authentication.
🏢 Internal Only: LOW - Primarily affects public-facing WordPress installations.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple file upload vulnerability with public proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.0 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/bravis-addons/vulnerability/wordpress-bravis-addons-plugin-1-1-9-arbitrary-file-upload-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Update Bravis Addons plugin to version 1.2.0 or later via WordPress admin panel. 2. Verify update completed successfully. 3. Test file upload functionality.

🔧 Temporary Workarounds

Disable Bravis Addons Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate bravis-addons

Restrict File Uploads via .htaccess

linux

Block execution of uploaded files in WordPress uploads directory.

Add to .htaccess in wp-content/uploads: <Files *.php> deny from all </Files>

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious file uploads
  • Restrict file upload permissions to authenticated administrators only

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Bravis Addons version number.

Check Version:

wp plugin get bravis-addons --field=version

Verify Fix Applied:

Confirm Bravis Addons version is 1.2.0 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to wp-content/uploads directory
  • POST requests to bravis-addons upload endpoints

Network Indicators:

  • HTTP POST requests with file uploads to bravis-addons endpoints
  • Unexpected .php/.exe files in uploads directory

SIEM Query:

source="web_server" AND (uri_path="*bravis-addons*" AND method="POST" AND content_type="multipart/form-data")

🔗 References

📤 Share & Export