Description
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gspb_make_proxy_api_request() function in versions 11.4 to 11.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The arbitrary file upload was sufficiently patched in 11.4.5, but a capability check was added in 11.4.6 to properly prevent unauthorized limited file uploads.
INFO
Published Date :
2025-04-22T04:21:32.528Z
Last Modified :
2025-04-22T13:17:08.386Z
Source :
Wordfence
AFFECTED PRODUCTS
The following products are affected by CVE-2025-3616 vulnerability.
| Vendors | Products |
|---|---|
| Greenshiftwp |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-3616.