{"uuid": "50936c04-6319-43a1-81fc-fa0110b439fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-1093", "type": "seen", "source": "https://t.me/cvedetector/23359", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-1093 - WordPress AIHub Theme Remote Code Execution File Upload Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-1093 \nPublished : April 19, 2025, 4:15 a.m. | 31\u00a0minutes ago \nDescription : The AIHub theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the generate_image function in all versions up to, and including, 1.3.7. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-19T06:47:29.000000Z"}