CVE-2025-6058

CRITICAL NUCLEI

WPBookit <1.0.4 - File Upload

Title source: llm

Description

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Exploits (4)

nomisec WORKING POC 1 stars
by 0xgh057r3c0n · poc
https://github.com/0xgh057r3c0n/CVE-2025-6058
nomisec WORKING POC 1 stars
by Nxploited · poc
https://github.com/Nxploited/CVE-2025-6058
github WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2025-6058
nomisec SCANNER
by JayVillain · poc
https://github.com/JayVillain/Scan-CVE-2025-6058

Nuclei Templates (1)

WPBookit <= 1.0.4 - Unauthenticated Arbitrary File Upload
CRITICALVERIFIEDby pussycat0x
FOFA: body="/wp-content/plugins/wpbookit/"

Scores

CVSS v3 9.8
EPSS 0.2171
EPSS Percentile 95.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-434
Status published
Products (1)
iqonic/wpbookit < 1.0.5
Published Jul 12, 2025
Tracked Since Feb 18, 2026