CVE-2025-10647

WordPress · WordPress Embed PDF for WPForms plugin

A high-severity vulnerability exists within the "Embed PDF for WPForms" WordPress plugin, identified as CVE-2025-10647.

Executive summary

A high-severity vulnerability exists within the "Embed PDF for WPForms" WordPress plugin, identified as CVE-2025-10647. This flaw allows an unauthenticated attacker to upload malicious files, such as web shells, directly to the server. Successful exploitation could lead to a complete compromise of the affected website, resulting in data theft, website defacement, or the server being used for further malicious activities.

Vulnerability

The vulnerability is an Arbitrary File Upload due to a lack of proper file type validation within the ajax_handler_download_pdf_media function. An attacker can craft a request to this function to upload a file with a malicious extension (e.g., .php) instead of the expected PDF. Once uploaded, the attacker can navigate to the file's location on the server to execute arbitrary code with the permissions of the web server, leading to Remote Code Execution (RCE).

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Exploitation can have severe consequences for the business, including unauthorized access to sensitive data such as customer information, payment details, or proprietary business data. This could lead to significant financial loss, regulatory penalties (e.g., GDPR, CCPA), and severe reputational damage. A compromised server could also be used to launch attacks against other systems, host phishing pages, or distribute malware, further damaging the organization's brand and trustworthiness.

Remediation

Immediate Action:

  • Immediately update the "Embed PDF for WPForms" plugin to the latest version provided by the vendor, which addresses this vulnerability.
  • If the plugin is not essential for business operations, the recommended course of action is to deactivate and uninstall it to completely remove the attack surface.
  • Review WordPress security settings to ensure file permissions are hardened and unnecessary user accounts are removed.

Proactive Monitoring:

  • Monitor web server and application logs for suspicious file upload attempts, particularly for files with extensions like .php, .phtml, or .phar being uploaded to media directories (e.g., /wp-content/uploads/).
  • Implement File Integrity Monitoring (FIM) to alert on the creation of new, unexpected files in the web application's directories.
  • Monitor for unusual outbound network traffic from the web server, which could indicate a web shell communicating with a command-and-control server.

Compensating Controls:

  • If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules specifically designed to block the upload of executable file types and inspect file contents.
  • Disable file execution in the uploads directory (e.g., via .htaccess or server configuration) to prevent uploaded scripts from running.
  • Restrict access to the WordPress administrative dashboard to trusted IP addresses to limit the exposure of potentially vulnerable functions.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the critical impact of a successful exploit (Remote Code Execution), this vulnerability presents a significant risk to the organization. Although not currently listed on the CISA KEV list, its severity makes it a prime candidate for future inclusion. We strongly recommend that all instances of the affected plugin be patched or removed immediately without delay to prevent a full server compromise.