Critical Vulnerabilities in WordPress (CVE-2025-9321, CVE-2025-5948, CVE-2025-9054, CVE-2025-10147, CVE-2025-10412)

Published On: Sep 29, 2025 15:03

Advisory No: TZCERT-SA-25-0112

Source: Wordfence

Software Affected: wpcasa, sf-booking, WooCommerce-Multi-Locations-Inventory-Management, podlove-podcasting-plugin-for-wordpress, uni-woo-custom-product-options-premium

Overview

WordPress is vulnerable to critical vulnerabilities. Exploitation of these vulnerabilities may allow an unauthenticated attacker to execute remote code.

Description

WordPress plugins wpcasa, sf-booking, WooCommerce-Multi-Locations-Inventory-Management, podlove-podcasting-plugin-for-wordpress, and uni-woo-custom-product-options-premium are affected by the vulnerabilities tracked as CVE-2025-9321, CVE-2025-5948, CVE-2025-9054, CVE-2025-10147, and CVE-2025-10412 with CVSS scores of 9.8 each. The plugins are vulnerable due to insufficient input validation and restriction on the 'api_requests' function, improper validation of a user's identity before claiming a business when using the claim_business AJAX action, missing capability check on the 'wcmlim_settings_ajax_handler' function, missing file type validation in the 'move_as_original_file' function and misconfigured file type validation in the 'uni_cpo_upload_file' function. Successful exploitation of this vulnerability allows unauthenticated attackers to call arbitrary functions and execute code, and log in as any user, including admins.

Impact

Successful exploitation of these vulnerabilities may allow an attacker to take control of the affected system.

Solution

WordPress has released security patches for these vulnerabilities. Users and administrators are encouraged to apply necessary updates.

Subscribe To TZ - CERT Newsletter

A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.

Subscribe
Report Incident