The WPshop 2 – E-Commerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajaxUpload function in versions before 1.3.9.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
References
| Link | Resource |
|---|---|
| https://g0blin.co.uk/g0blin-00036/ | Exploit Third Party Advisory |
| https://github.com/espreto/wpsploit/blob/master/modules/exploits/unix/webapp/wp_wpshop_ecommerce_file_upload.rb | Product |
| https://plugins.trac.wordpress.org/changeset/1103406 | Patch |
| https://wordpress.org/plugins/wpshop/#developers | Product |
| https://www.wordfence.com/threat-intel/vulnerabilities/id/32e8224d-a653-48d7-a3f4-338fc0c1dc77?source=cve | Third Party Advisory |
Configurations
History
16 Dec 2025, 16:49
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Eoxia
Eoxia wpshop 2 |
|
| CPE | cpe:2.3:a:eoxia:wpshop_2:*:*:*:*:*:wordpress:*:* | |
| References | () https://g0blin.co.uk/g0blin-00036/ - Exploit, Third Party Advisory | |
| References | () https://github.com/espreto/wpsploit/blob/master/modules/exploits/unix/webapp/wp_wpshop_ecommerce_file_upload.rb - Product | |
| References | () https://plugins.trac.wordpress.org/changeset/1103406 - Patch | |
| References | () https://wordpress.org/plugins/wpshop/#developers - Product | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/32e8224d-a653-48d7-a3f4-338fc0c1dc77?source=cve - Third Party Advisory |
22 Jul 2025, 13:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
19 Jul 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-19 10:15
Updated : 2025-12-16 16:49
NVD link : CVE-2015-10135
Mitre link : CVE-2015-10135
CVE.ORG link : CVE-2015-10135
JSON object : View
Products Affected
eoxia
- wpshop_2
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
