CVE-2025-12500

Plain English Summary

AI-powered analysis for quick understanding

An attacker can upload files to a WordPress site using the Checkout Field Manager plugin without needing to log in, as the plugin fails to check if the user is authorized for this action. While the types of files they can upload are limited to common formats like images and documents, this still poses a risk of malicious content being introduced to the server.

Technical Description

The Checkout Field Manager (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to unauthenticated limited file upload in all versions up to, and including, 7.8.1. This is due to the plugin not properly verifying that a user is authorized to perform file upload actions via the "ajax_checkout_attachment_upload" function. This makes it possible for unauthenticated attackers to upload files to the server, though file types are limited to WordPress's default allowed MIME types (images, documents, etc.).

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$724($500-$1K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 19, 2026

about 2 months ago

Last Modified

Feb 19, 2026

about 2 months ago