Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11996: CWE-862 Missing Authorization in toastwebsites Find Unused Images

0
Medium
VulnerabilityCVE-2025-11996cvecve-2025-11996cwe-862
Published: Tue Nov 11 2025 (11/11/2025, 03:30:35 UTC)
Source: CVE Database V5
Vendor/Project: toastwebsites
Product: Find Unused Images

Description

The Find Unused Images plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the fui_delete_image() and fui_delete_all_images() functiosn in all versions up to, and including, 1.0.7. This makes it possible for unauthenticated attackers to delete all of a site's attachments.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:48:03 UTC

Technical Analysis

CVE-2025-11996 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Find Unused Images plugin for WordPress, developed by toastwebsites. The vulnerability exists because the plugin fails to perform proper capability checks in the fui_delete_image() and fui_delete_all_images() functions. These functions are responsible for deleting individual or all unused images (attachments) from a WordPress site. Due to the missing authorization, unauthenticated attackers can invoke these functions remotely without any credentials or user interaction, enabling them to delete all attachments on the site. This results in unauthorized data loss, specifically the deletion of media files that may be critical for website content and functionality. The vulnerability affects all versions up to and including 1.0.7 of the plugin. The CVSS v3.1 base score is 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts only integrity (I:L) without affecting confidentiality (C:N) or availability (A:N). No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on October 20, 2025, and published on November 11, 2025.

Potential Impact

The primary impact of this vulnerability is unauthorized deletion of media attachments on WordPress sites using the affected plugin. This compromises the integrity of website content, potentially causing significant disruption to site appearance, functionality, and user experience. Organizations relying on this plugin may face data loss that could require time-consuming restoration from backups or manual re-upload of media assets. Although the vulnerability does not directly affect confidentiality or availability, the loss of media files can indirectly affect availability by degrading site usability and trustworthiness. For e-commerce, media-heavy, or content-driven websites, this could lead to reputational damage, loss of customer trust, and potential revenue loss. Since exploitation requires no authentication and can be performed remotely, the attack surface is broad, increasing the risk of opportunistic attacks. The lack of known exploits in the wild suggests limited current exploitation, but the vulnerability's simplicity and impact make it a likely target for future attacks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their WordPress installations for the presence of the Find Unused Images plugin, especially versions up to 1.0.7. If the plugin is installed, disable or uninstall it until a patched version is released. Since no official patch links are currently available, monitoring the vendor's announcements and WordPress plugin repository for updates is critical. As a temporary measure, restrict access to the plugin's endpoints via web application firewall (WAF) rules or server-level access controls to block unauthenticated requests targeting the vulnerable functions. Implement strict file and directory permissions to limit the plugin's ability to delete attachments. Regularly back up all website data, including media files, to enable rapid recovery in case of exploitation. Additionally, consider deploying intrusion detection systems (IDS) or monitoring tools to detect unusual deletion activities. Educate site administrators about the risks of installing unverified plugins and encourage the use of plugins with active maintenance and security support.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-20T20:44:00.939Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912b13014bc3e00ba783d2c

Added to database: 11/11/2025, 3:44:48 AM

Last enriched: 2/27/2026, 7:48:03 PM

Last updated: 3/24/2026, 5:42:05 PM

Views: 92

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses