Home

Description

The Qyrr – simply and modern QR-Code creation plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the blob_to_file() function in all versions up to, and including, 2.0.7. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PUBLISHED Reserved 2025-09-04 | Published 2025-09-30 | Updated 2025-09-30 | Assigner Wordfence




MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-434 Unrestricted Upload of File with Dangerous Type

Product status

Default status
unaffected

*
affected

Timeline

2025-09-29:Disclosed

Credits

Alexander Chikaylo finder

References

www.wordfence.com/...-64c4-4112-b126-aabd3e09144b?source=cve

plugins.trac.wordpress.org/.../trunk/inc/class-qyrr-rest.php

cve.org (CVE-2025-10000)

nvd.nist.gov (CVE-2025-10000)

Download JSON