Arbitrary File Upload Vulnerability in BerqWP Plugin for WordPress
CVE-2025-7443
8.1HIGH
Key Information:
- Vendor
WordPress
- Vendor
- CVE Published:
- 1 August 2025
What is CVE-2025-7443?
The BerqWP plugin, responsible for optimizing page speed and related functionalities in WordPress, contains a vulnerability due to insufficient file type validation in the store_javascript_cache.php file. This weakness allows unauthenticated attackers to upload arbitrary files to the server. Such uploads can potentially lead to remote code execution, enabling attackers to execute malicious scripts on the compromised site, which can result in data breaches or complete site takeover.
Affected Version(s)
BerqWP β Automated All-In-One Page Speed Optimization for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript * <= 2.2.42
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Michael Mazzolini