CVE-2025-7852

The · The WPBookit plugin for WordPress

A critical vulnerability has been identified in the WPBookit plugin for WordPress, which could allow an unauthenticated attacker to take complete control of an affected website.

Executive summary

A critical vulnerability has been identified in the WPBookit plugin for WordPress, which could allow an unauthenticated attacker to take complete control of an affected website. The flaw enables the upload of malicious files, such as web shells, by exploiting a function that lacks proper security checks. Successful exploitation could lead to data theft, website defacement, and further compromise of the underlying server.

Vulnerability

The WPBookit plugin contains an arbitrary file upload vulnerability within the image_upload_handle() function. This function, accessible via the add_new_customer route, fails to properly validate the types of files being uploaded. An unauthenticated attacker can craft a request to this endpoint to upload a malicious executable file (e.g., a PHP web shell) disguised as an image, bypassing the intended file type restrictions. Once uploaded, the attacker can access the malicious file via a direct URL to execute arbitrary code on the server in the context of the web server user.

Business impact

This vulnerability is rated as critical with a CVSS score of 9.8. Exploitation could lead to a full compromise of the web server, resulting in severe business consequences. Potential impacts include the theft of sensitive data (customer information, payment details, intellectual property), reputational damage from website defacement, loss of customer trust, and financial costs associated with incident response and recovery. Furthermore, the compromised server could be used as a pivot point for launching further attacks against the internal network or to distribute malware to website visitors.

Remediation

Immediate Action: Immediately update the WPBookit plugin for WordPress to the latest patched version as recommended by the vendor. After patching, review web server access logs and file system upload directories for any signs of compromise that may have occurred prior to the update.

Proactive Monitoring: Implement continuous monitoring of web server logs for suspicious POST requests to the add_new_customer endpoint or other plugin-specific routes. Use a File Integrity Monitoring (FIM) solution to alert on the creation of unexpected or malicious files (e.g., .php, .phtml, .sh) in WordPress upload directories. Network traffic should be monitored for unusual outbound connections from the web server, which could indicate a successful compromise.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules specifically designed to block malicious file uploads by inspecting file signatures and extensions. If the add_new_customer functionality is not essential, consider disabling the feature or restricting access to it at the web server level. Additionally, harden the server by disabling PHP execution in the wp-content/uploads directory.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the critical severity (CVSS 9.8) and the low complexity of exploitation, we strongly recommend that all organizations using the WPBookit plugin apply the security update immediately. This vulnerability should be considered a top priority for remediation. The lack of a public exploit should not deter immediate action, as one could be developed and deployed by threat actors at any time. A proactive patching and monitoring stance is crucial to prevent a potentially devastating compromise.