A critical vulnerability tracked as CVE‑2025‑4389 (CVSS 9.8) allows unauthenticated attackers to upload any file type including web‑shells via the crawlomatic_generate_featured_image()
hook in Crawlomatic Multipage Scraper Post Generator WordPress plugin versions ≤ 2.6.8.1. First disclosed on 16 May 2025 by researcher “Foxyyy” and indexed by Wordfence, NVD, GitHub Advisories and multiple threat‑intel feeds, the flaw stems from missing MIME/extension validation and executes before WordPress capability checks, making remote‑code‑execution (RCE) trivial.
Thousands of sites across hosting providers in the Middle East, Africa and beyond rely on the autoblogging plugin, so mass exploitation waves are now expected until administrators patch to v2.6.8.2 or above. This piece unpacks the technical root cause, real‑world risk, regional impact and immediate mitigations.
The Vulnerability in Context
What is Crawlomatic?
Crawlomatic Multipage Scraper Post Generator is a premium CodeCanyon WordPress plugin used to automatically crawl external websites and convert their content into WordPress posts popular among news aggregators in Saudi Arabia, UAE, Egypt, Kenya and Nigeria. The plugin boasts 20 000+ sales on CodeCanyon as of May 2025. Vulners
Timeline of Disclosure
Date | Milestone |
---|---|
15 May 2025 | Independent researcher Foxyyy identifies arbitrary file‑upload bug and privately contacts vendor. (wordfence.com) |
16 May 2025 | Wordfence Intelligence publishes advisory; CVE‑2025‑4389 reserved. (wordfence.com, wordfence.com) |
17 May 2025 | NVD scores vulnerability 9.8/Critical (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). (NVD) |
18 May 2025 | Patched version 2.6.8.2 released on CodeCanyon. (Vulners) |
19 May 2025 | Social‑media proof‑of‑concept (PoC) exploit drops on X (formerly Twitter). (X (formerly Twitter)) |
20 May 2025 | Search Engine Journal and The Cyber Express warn of active scanning activity. (Search Engine Journal, The Cyber Express) |
Technical Deep‑Dive
Root Cause
The function crawlomatic_generate_featured_image()
processes remote images but fails to enforce server‑side validation of MIME type or file extension. An attacker can POST a multipart/form‑data request to /wp-admin/admin-ajax.php?action=crawlomatic_generate_featured_image
with a payload such as shell.php
, which is saved in the WordPress uploads directory and accessible via HTTP, enabling RCE. (wordfence.com, GitHub)
Unlike typical file‑upload flaws limited by upload_mimes
or WP roles, this vulnerability is triggered from the publicly accessible admin‑ajax.php
endpoint that intentionally allows unauthenticated access for front‑end AJAX actions. The plugin’s logic neglects both check_ajax_referer()
and current_user_can()
calls.
Attack Chain (MITRE ATT&CK)
Phase | Technique | ID |
---|---|---|
Initial Access | Exploit public‑facing application | T1190 |
Execution | OS Command Execution via web‑shell | T1059.004 |
Persistence | Modify Web Config / Upload malicious plugin | T1505.003 |
Defense Evasion | Obfuscated/Encrypted payload | T1027 |
Impact | Website defacement, data exfiltration, full takeover | T1499 |
Exploit & PoC
A four‑line curl command circulating in underground forums confirms shell upload in <1 second:
curl -F "action=crawlomatic_generate_featured_image" \
-F "featured_image=@shell.php" \
https://victim.site/wp-admin/admin-ajax.php
Replace shell.php
with any PHP backdoor to gain interactive access.
Real‑World Exposure
- Shodan reports >12 600 WordPress sites still running Crawlomatic ≤ 2.6.8.1 as of 19 May 2025; ~28 % geolocated in MEA hosting ASNs like Etisalat UAE and Liquid Telecom. The Cyber Express
- Major regional news‑aggregation networks leveraging autoblogging are particularly at risk because their web servers often hold extensive RSS credentials and API keys.
- Shared hosting environments amplify blast radius; one compromised account can pivot laterally via symlink attacks. Feedly
Vendor & Community Response
- Plugin Author (CodeCanyon user CodeRevolution): released v2.6.8.2 patch adding strict
wp_check_filetype_and_ext()
validation and nonce checks. Vulners - Wordfence Premium and Sucuri WAF pushed virtual patch rules within 24 hours. wordfence.com
- No evidence yet of coordinated mass exploitation, but GreyNoise telemetry shows rising scan traffic on
admin-ajax.php
with the vulnerable action name. Search Engine Journal
Ten Practical Defenses
- Patch Immediately – upgrade Crawlomatic to 2.6.8.2 or later across all environments; remove the plugin if unused. wordfence.com
- Implement a Web Application Firewall – enable virtual patches from vendors (Wordfence, Sucuri, Cloudflare) to block malicious multipart uploads. wordfence.com
- Restrict
admin‑ajax.php
– limit access to authenticated users where business logic permits, via.htaccess
or nginx directives. - Harden Upload Directories – disable execution (
Options -ExecCGI
) in/wp-content/uploads/
to thwart shell execution. - Continuous Vulnerability Scanning – integrate WP‑CLI with CI pipelines to flag outdated plugins automatically.
- Principle of Least Privilege – isolate websites in separate UNIX users/chroot jails on shared hosts to prevent cross‑site contamination.
- File‑Integrity Monitoring – deploy OSSEC or Wazuh to alert on new
.php
,.jsp
,.py
in upload paths. - Regular Backups & Immutable Storage – ensure rapid restoration if defacement or ransomware follows exploitation.
- Security Headers & CSP – reduce XSS pivot points attackers may exploit post‑shell.
- Incident‑Response Plan – prepare playbooks for log acquisition (
wp‑content/debug.log
,/var/log/nginx/access.log
) and compromise assessment using WPScan.
Conclusion
The CVE‑2025‑4389 flaw in Crawlomatic underscores a perennial WordPress reality: third‑party plugins remain the largest attack surface, and unauthenticated file upload bugs are gold‑mines for threat actors. Given the plugin’s popularity among content‑hungry sites in MEA, cybersecurity teams should prioritise patching, hardening and continuous monitoring to pre‑empt exploitation waves likely to follow public PoCs. WordPress will stay indispensable across the region’s digital economy, but only vigilant maintenance and layered controls can keep auto‑publishing tools from auto‑inviting attackers.