VulnTitan

VulnTitan

The WordPress Vulnerability Index

Beaver Builder Plugin (Starter Version) <= 2.9.1 - Authenticated (Administrator+) Arbitrary File Upload

plugin
High
  • Vulnerability Database
  • /
  • Beaver Builder Plugin (Starter Version) <= 2.9.1 - Authenticated (Administrator+) Arbitrary File Upload
7.2
Unrestricted Upload of File with Dangerous Type
CVE CVE-2025-4102
CVSS 7.2 (High)
Publicly Published Jun 19, 2025
Last Updated Jun 20, 2025
Researchers Tom Broucke

Description

The Beaver Builder Plugin (Starter Version) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'save_enabled_icons' function in all versions up to, and including, 2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The vulnerability was partially patched in version 2.9.1.

References

Share

Vulnerability Details

Software Type plugin
Software Slug bb-plugin (view on wordpress.org)
Patched Yes
Remediation Update to version 2.9.1.1, or a newer patched version
Affected Versions
  • * - 2.9.1
Patched Versions
  • 2.9.1.1

This record contains material that is subject to copyright

Copyright 2012-2025 Defiant Inc.

License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more.


Copyright 1999-2025 The MITRE Corporation

License: CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy. Read more.