CVE-2025-7441
CRITICAL EXPLOITEDStoryChief WordPress <1.0.42 - RCE
Title source: llmDescription
The StoryChief plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 1.0.42. This vulnerability occurs through the /wp-json/storychief/webhook REST-API endpoint that does not have sufficient filetype validation. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
Exploits (6)
github
WORKING POC
by Boshe99 · pythonpoc
https://github.com/Boshe99/CVE-Exploits/tree/main/CVE-2025-7441
metasploit
WORKING POC
EXCELLENT
by xpl0dec, Nayera · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_plugin_story_chef_file_upload.rb
Scores
CVSS v3
9.8
EPSS
0.6972
EPSS Percentile
98.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-08-15
CWE
CWE-434
Status
published
Products (1)
storychief/StoryChief
< 1.0.42
Published
Aug 16, 2025
Tracked Since
Feb 18, 2026