CVE-2025-9113
The · The Doccure theme for WordPress
A critical vulnerability has been identified in the Doccure theme for WordPress, which allows an attacker to upload malicious files to the web server.
Executive summary
A critical vulnerability has been identified in the Doccure theme for WordPress, which allows an attacker to upload malicious files to the web server. This flaw could lead to a complete compromise of the affected website, enabling attackers to steal data, deface the site, or use the server for further malicious activities. Due to the high severity, immediate action is required to patch the vulnerability and prevent exploitation.
Vulnerability
The vulnerability exists within the doccure_temp_upload_to_media function, which fails to properly validate the types of files being uploaded. An unauthenticated or low-privileged attacker can exploit this flaw by crafting a request to upload a malicious script (e.g., a PHP web shell) disguised as a legitimate file. Once the malicious file is on the server, the attacker can access it via a direct URL to execute arbitrary code in the context of the web server, leading to a full system compromise.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.8, posing a significant and immediate threat to the organization. Successful exploitation could result in a complete breach of the web server, leading to the theft of sensitive data, including customer information, payment details, and intellectual property. Further risks include website defacement, service disruption, reputational damage, and the potential for the compromised server to be used as a launchpad for attacks against other systems, creating legal and financial liabilities.
Remediation
Immediate Action: Immediately update the Doccure WordPress theme to the latest version available (newer than 1.4.8) which contains the security patch for this vulnerability. After updating, review the website's media and upload directories for any suspicious or unrecognized files that may have been uploaded prior to the patch.
Proactive Monitoring: Monitor web server access logs for unusual POST requests to upload endpoints and direct requests to non-image files (e.g., .php, .phtml, .sh) within upload directories. Implement file integrity monitoring on the web server to detect the creation of unauthorized files. Watch for unexpected outbound network traffic from the web server, which could indicate a successful compromise.
Compensating Controls: If patching cannot be performed immediately, implement a Web Application Firewall (WAF) with rules specifically designed to inspect file uploads and block executable file types. Additionally, configure the web server to disable script execution within the WordPress upload directory (e.g., /wp-content/uploads/) as a temporary mitigation measure.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.8 and the ease of exploitation, this vulnerability must be treated with the highest priority. All organizations using the Doccure WordPress theme must apply the vendor-supplied patch immediately. Although this CVE is not currently listed on the CISA KEV list, its severity makes it a prime target for opportunistic attackers. After patching, a thorough security review should be conducted to ensure no signs of prior compromise exist.