The Vitepos – Point of Sale (POS) for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the insert_media_attachment() function in all versions up to, and including, 3.3.0. This is due to the save_update_category_img() function accepting user-supplied file types without validation when processing category images. This makes it possible for authenticated attackers, with subscriber level access and above, to upload arbitrary files on the affected site's server which makes remote code execution possible.
History

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Appsbd
Appsbd vitepos
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Appsbd
Appsbd vitepos
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Vitepos – Point of Sale (POS) for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the insert_media_attachment() function in all versions up to, and including, 3.3.0. This is due to the save_update_category_img() function accepting user-supplied file types without validation when processing category images. This makes it possible for authenticated attackers, with subscriber level access and above, to upload arbitrary files on the affected site's server which makes remote code execution possible.
Title Vitepos – Point of Sale (POS) for WooCommerce <= 3.3.0 - Authenticated (Subscriber+) Arbitrary File Upload to Remote Code Execution
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-11-21T08:28:15.190Z

Updated: 2025-11-21T14:55:31.247Z

Reserved: 2025-11-13T22:02:28.030Z

Link: CVE-2025-13156

cve-icon Vulnrichment

Updated: 2025-11-21T14:41:23.121Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-21T09:15:46.887

Modified: 2025-11-21T15:13:13.800

Link: CVE-2025-13156

cve-icon Redhat

No data.