CVE-2025-12500
Plain English Summary
AI-powered analysis for quick understanding
An attacker can upload files to a WordPress site using the Checkout Field Manager plugin without needing to log in, as the plugin fails to check if the user is authorized for this action. While the types of files they can upload are limited to common formats like images and documents, this still poses a risk of malicious content being introduced to the server.
Technical Description
The Checkout Field Manager (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to unauthenticated limited file upload in all versions up to, and including, 7.8.1. This is due to the plugin not properly verifying that a user is authorized to perform file upload actions via the "ajax_checkout_attachment_upload" function. This makes it possible for unauthenticated attackers to upload files to the server, though file types are limited to WordPress's default allowed MIME types (images, documents, etc.).
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 19, 2026
about 2 months ago
Last Modified
Feb 19, 2026
about 2 months ago