CVE-2025-3914
HIGHAeropage Sync for Airtable <3.2.0 - Code Injection
Title source: llmDescription
The Aeropage Sync for Airtable plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aeropage_media_downloader' function in all versions up to, and including, 3.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Exploits (1)
nomisec
WORKING POC
by LvL23HT · poc
https://github.com/LvL23HT/PoC-CVE-2025-3914-Aeropage-WordPress-File-Upload
References (5)
Scores
CVSS v3
8.8
EPSS
0.0308
EPSS Percentile
86.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-434
Status
published
Products (2)
aeropage/Aeropage Sync for Airtable
< 3.2.0
aeropage/aeropage_sync_for_airtable
< 3.3.0
Published
Apr 26, 2025
Tracked Since
Feb 18, 2026