Vulnerability Description
The Mail Mint plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_contact_attribute_import function in all versions up to, and including, 1.18.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/3389643/mail-mint/tags/1.18.11/app/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/cf902756-21f3-483b-a5d
FAQ
What is CVE-2025-11967?
CVE-2025-11967 is a vulnerability with a CVSS score of 7.2 (HIGH). The Mail Mint plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_contact_attribute_import function in all versions up to, and including, 1....
How severe is CVE-2025-11967?
CVE-2025-11967 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-11967?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.