Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-23918 β€” AI Deep Analysis Summary

CVSS 9.9 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Arbitrary File Upload vulnerability in Smallerik File Browser.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-434** (Unrestricted Upload of File with Dangerous Type). The plugin fails to validate file extensions or content types before saving uploads. ⚠️ No sanitization or allow-listing implemented.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **Smallerik File Browser** WordPress Plugin. πŸ“… **Version**: 1.1 and earlier. 🏒 **Vendor**: Enrico Sandoli. Note: Core WordPress is not directly vulnerable, but the plugin integration is at risk.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Attacker Actions**: Upload PHP/JS shells. πŸ—οΈ **Privileges**: Execute arbitrary code on the server. πŸ“‚ **Data**: Read/Write sensitive files, steal user data, or pivot to internal networks.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **Low** for Auth, **High** for Access. Requires **PR:L** (Low Privileges) – meaning the attacker needs a valid WordPress account (even subscriber level). No UI interaction needed (UI:N).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ§ͺ **Exploit Status**: No public PoC/Exploit listed in the data (pocs: []). However, the vulnerability type is well-known.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Scan for `Smallerik File Browser` plugin. 2. Check version <= 1.1. 3. Look for upload endpoints in the plugin. 4. Test if `.php` files can be uploaded via the file browser interface.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix Status**: Patch available via vendor/patchstack. πŸ“ **Action**: Update to the latest version immediately. Check the official WordPress repository or vendor site for the patched release.…

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Disable/Deactivate** the plugin immediately. 2. Restrict file upload permissions in `wp-config.php` if possible. 3. Implement WAF rules to block `.php` uploads. 4.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. CVSS Vector indicates High Impact (C:H, I:H, A:H). Even with PR:L, the ease of exploitation (AC:L) makes it dangerous. πŸš€ **Priority**: Patch immediately or disable the plugin to prevent RCE.…