Vulnerability Description
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gspb_make_proxy_api_request() function in versions 11.4 to 11.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The arbitrary file upload was sufficiently patched in 11.4.5, but a capability check was added in 11.4.6 to properly prevent unauthorized limited file uploads.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Greenshiftwp | Greenshift - Animation And Page Builder Blocks | >= 11.4, < 11.4.6 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/greenshift-animation-and-page-builderProduct
- https://plugins.trac.wordpress.org/changeset/3270279/greenshift-animation-and-paPatch
- https://plugins.trac.wordpress.org/changeset/3273212/greenshift-animation-and-paPatch
- https://plugins.trac.wordpress.org/changeset/3276168/greenshift-animation-and-paPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/0db4671e-1989-44a4-babThird Party Advisory
FAQ
What is CVE-2025-3616?
CVE-2025-3616 is a vulnerability with a CVSS score of 8.8 (HIGH). The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gspb_make_proxy_api_request() function in ver...
How severe is CVE-2025-3616?
CVE-2025-3616 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-3616?
Check the references section above for vendor advisories and patch information. Affected products include: Greenshiftwp Greenshift - Animation And Page Builder Blocks.