CVE-2025-13094

WordPress · WordPress WP3D Model Import Viewer plugin

A high-severity vulnerability has been identified in the WP3D Model Import Viewer plugin for WordPress.

Executive summary

A high-severity vulnerability has been identified in the WP3D Model Import Viewer plugin for WordPress. This flaw allows an unauthenticated attacker to upload malicious files to a website, which can lead to a complete compromise of the server. Successful exploitation could result in data theft, website defacement, or the server being used for further malicious activities.

Vulnerability

The vulnerability exists within the handle_import_file() function of the plugin, which is responsible for processing file uploads. The function fails to properly validate the type of file being uploaded, meaning it does not check if the file is a legitimate 3D model. An attacker can exploit this by crafting a request to upload a malicious script (e.g., a PHP web shell) disguised as a standard file, which the server will accept and save. Once the malicious file is on the server, the attacker can navigate to its location to execute arbitrary code with the permissions of the web server, leading to a full system compromise.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit could have a significant negative impact on the business, including the theft of sensitive data such as customer information, payment details, and intellectual property. An attacker could also deface the corporate website, causing reputational damage and loss of customer trust. Furthermore, the compromised server could be used to host malware, launch attacks against other systems, or be incorporated into a botnet, potentially leading to legal and financial liabilities.

Remediation

Immediate Action: Immediately update the WP3D Model Import Viewer plugin to the latest patched version provided by the developer. If the plugin is not critical to business operations, the recommended course of action is to disable and completely remove it to eliminate the attack surface.

Proactive Monitoring: Monitor web server logs for suspicious POST requests to the plugin's file upload endpoints. Scrutinize the WordPress uploads directory for any non-standard or executable file types (e.g., .php, .phtml, .sh). Implement file integrity monitoring to detect unauthorized changes to website files and monitor for unusual outbound network traffic from the web server.

Compensating Controls: If patching is not immediately possible, implement a Web Application Firewall (WAF) with rules to block the upload of executable file types. Restrict file permissions on the server's upload directories to prevent any uploaded files from being executed. Disabling the file import functionality of the plugin, if possible through its settings, can also serve as a temporary mitigation.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the ease of exploitation, this vulnerability poses a critical risk to the organization. We strongly recommend that immediate action is taken to apply the vendor's patch or remove the vulnerable plugin from all WordPress instances. Although this CVE is not currently listed on the CISA KEV catalog, its severity warrants treating it with the highest priority to prevent a potential server compromise.