Description

The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gspb_make_proxy_api_request() function in versions 11.4 to 11.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The arbitrary file upload was sufficiently patched in 11.4.5, but a capability check was added in 11.4.6 to properly prevent unauthorized limited file uploads.

INFO

Published Date :

2025-04-22T04:21:32.528Z

Last Modified :

2025-04-22T13:17:08.386Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2025-3616 vulnerability.

Vendors Products
Greenshiftwp
  • Greenshift - Animation And Page Builder Blocks

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact