[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]  CVE [@CVEnew](/creator/twitter/CVEnew) on x 55.1K followers Created: 2025-07-24 04:53:19 UTC CVE-2025-7437 The Ebook Store plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ebook_store_save_form function in all versions u… XXX engagements  **Related Topics** [plugin](/topic/plugin) [Post Link](https://x.com/CVEnew/status/1948245085616837073)
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
CVE @CVEnew on x 55.1K followers
Created: 2025-07-24 04:53:19 UTC
CVE-2025-7437 The Ebook Store plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ebook_store_save_form function in all versions u…
XXX engagements
Related Topics plugin
/post/tweet::1948245085616837073