
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability (CVE-2025-32579) was discovered in SoftClever Limited's Sync Posts WordPress plugin version 1.0 and below. The vulnerability was identified on April 10, 2025, and involves an Unrestricted Upload of File with Dangerous Type that allows attackers to upload a web shell to a web server (Patchstack).
The vulnerability is classified as CWE-434 (Unrestricted Upload of File with Dangerous Type) and has received a CVSS v3.1 score of 9.9 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H. This indicates network accessibility, low attack complexity, low privileges required, no user interaction needed, and high impact on confidentiality, integrity, and availability (Patchstack).
The vulnerability allows malicious actors to upload any type of file to the affected website, including backdoors which can be executed to gain further access. The software is considered abandoned, having not received updates for over a year, which compounds the security risk (Patchstack).
No official fix is currently available for this vulnerability. The recommended mitigation steps include either removing and replacing the software entirely or implementing virtual patching through security solutions. Deactivating the software alone does not remove the security threat unless additional protective measures are deployed (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."