CVE-2025-3914

HIGH

Aeropage Sync for Airtable <3.2.0 - Code Injection

Title source: llm

Description

The Aeropage Sync for Airtable plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aeropage_media_downloader' function in all versions up to, and including, 3.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Exploits (1)

nomisec WORKING POC
by LvL23HT · poc
https://github.com/LvL23HT/PoC-CVE-2025-3914-Aeropage-WordPress-File-Upload

Scores

CVSS v3 8.8
EPSS 0.0308
EPSS Percentile 86.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-434
Status published
Products (2)
aeropage/Aeropage Sync for Airtable < 3.2.0
aeropage/aeropage_sync_for_airtable < 3.3.0
Published Apr 26, 2025
Tracked Since Feb 18, 2026