
Cloud Vulnerability DB
A community-led vulnerabilities database
The Doccure theme for WordPress contains a critical vulnerability (CVE-2025-9113) discovered on September 8, 2025. The vulnerability affects all versions up to and including 1.4.8, allowing unauthenticated attackers to perform arbitrary file uploads due to missing file type validation in the 'doccuretempuploadtomedia' function (NVD Database).
The vulnerability is classified as CWE-434 (Unrestricted Upload of File with Dangerous Type) with a CVSS v3.1 base score of 9.8 (CRITICAL). The attack vector is characterized by CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, no privileges required, and no user interaction needed (Wordfence).
The vulnerability allows attackers to upload arbitrary files to the affected site's server, potentially enabling remote code execution. This presents a severe security risk as it could lead to complete system compromise with high impacts on confidentiality, integrity, and availability of the affected system (NVD Database).
Website administrators running the Doccure WordPress theme should immediately update to a version newer than 1.4.8 if available. In the absence of an update, it is recommended to disable file upload functionality or implement strict file type validation at the server level (Themeforest).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."