CVE-2025-7441

CRITICAL EXPLOITED

StoryChief WordPress <1.0.42 - RCE

Title source: llm

Description

The StoryChief plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 1.0.42. This vulnerability occurs through the /wp-json/storychief/webhook REST-API endpoint that does not have sufficient filetype validation. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Exploits (6)

exploitdb WORKING POC
by xpl0dec · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52422
nomisec WORKING POC 2 stars
by AnotherSec · poc
https://github.com/AnotherSec/CVE-2025-7441
github WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2025-7441
github WORKING POC
by Nxploited · pythonremote
https://github.com/Nxploited/CVE-2025-7441
vulncheck_xdb WORKING POC
remote
https://github.com/Pwdnx1337/CVE-2025-7441
metasploit WORKING POC EXCELLENT
by xpl0dec, Nayera · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_plugin_story_chef_file_upload.rb

Scores

CVSS v3 9.8
EPSS 0.6972
EPSS Percentile 98.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2025-08-15
CWE
CWE-434
Status published
Products (1)
storychief/StoryChief < 1.0.42
Published Aug 16, 2025
Tracked Since Feb 18, 2026