CVE-2025-6058
CRITICAL NUCLEIWPBookit <1.0.4 - File Upload
Title source: llmDescription
The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Exploits (4)
github
WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2025-6058
Nuclei Templates (1)
WPBookit <= 1.0.4 - Unauthenticated Arbitrary File Upload
CRITICALVERIFIEDby pussycat0x
FOFA:
body="/wp-content/plugins/wpbookit/"
References (3)
Scores
CVSS v3
9.8
EPSS
0.2171
EPSS Percentile
95.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (1)
iqonic/wpbookit
< 1.0.5
Published
Jul 12, 2025
Tracked Since
Feb 18, 2026