CVE-2025-12153: CWE-434 Unrestricted Upload of File with Dangerous Type in tsaiid Featured Image via URL
The Featured Image via URL plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation function in all versions up to, and including, 0.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI Analysis
Technical Summary
CVE-2025-12153 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the 'Featured Image via URL' WordPress plugin developed by tsaiid. The vulnerability exists because the plugin fails to validate the file type of uploads properly, allowing authenticated users with Contributor-level permissions or higher to upload arbitrary files to the web server. Since WordPress Contributor roles typically allow content creation but not administrative control, this vulnerability escalates the threat by enabling these users to bypass intended restrictions. The uploaded files can be crafted to include malicious code, potentially leading to remote code execution (RCE) on the server hosting the WordPress site. The CVSS 3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with low attack complexity, no user interaction needed, and requiring only low privileges (authenticated Contributor). The vulnerability affects all versions up to and including 0.1 of the plugin, with no patch currently available. Although no exploits have been reported in the wild, the risk remains significant due to the ease of exploitation and potential for severe damage. The vulnerability was reserved on 2025-10-24 and published on 2025-12-05, indicating recent discovery and disclosure. This flaw is particularly dangerous for WordPress sites that allow Contributor-level users to upload images via URL using this plugin, as it can be leveraged to gain unauthorized server access and control.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to websites running WordPress with the affected plugin installed. Exploitation can lead to unauthorized remote code execution, resulting in data breaches, defacement, service disruption, or full server compromise. Organizations in sectors relying heavily on web presence, such as media, e-commerce, education, and government, face heightened risks. Confidential information stored or processed by the site could be exposed or altered, damaging reputation and compliance with data protection regulations like GDPR. The availability of the website may be impacted through denial-of-service or malicious payload execution. Since Contributor-level users can exploit this, insider threats or compromised accounts increase the attack surface. The lack of a patch means organizations must rely on immediate mitigations to prevent exploitation. The vulnerability's network attack vector and no requirement for user interaction make it a viable target for automated attacks, increasing the likelihood of exploitation in the European threat landscape.
Mitigation Recommendations
1. Immediately restrict or disable the 'Featured Image via URL' plugin until a security patch is released by the vendor. 2. Limit Contributor-level user permissions strictly, ensuring only trusted users have such access. 3. Implement web application firewalls (WAF) with rules to detect and block suspicious file upload attempts, especially those targeting the plugin's upload endpoints. 4. Employ server-side file type validation and scanning to detect and quarantine potentially malicious files uploaded via the plugin. 5. Monitor logs for unusual file upload activity or unexpected file types being uploaded by Contributor users. 6. Use intrusion detection/prevention systems (IDS/IPS) to identify exploitation attempts. 7. Harden WordPress installations by disabling unnecessary plugins and enforcing the principle of least privilege. 8. Prepare incident response plans to quickly isolate and remediate compromised systems if exploitation occurs. 9. Stay updated with vendor advisories and apply patches immediately once available. 10. Consider alternative plugins with robust security practices for image uploads.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-12153: CWE-434 Unrestricted Upload of File with Dangerous Type in tsaiid Featured Image via URL
Description
The Featured Image via URL plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation function in all versions up to, and including, 0.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
AI-Powered Analysis
Technical Analysis
CVE-2025-12153 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the 'Featured Image via URL' WordPress plugin developed by tsaiid. The vulnerability exists because the plugin fails to validate the file type of uploads properly, allowing authenticated users with Contributor-level permissions or higher to upload arbitrary files to the web server. Since WordPress Contributor roles typically allow content creation but not administrative control, this vulnerability escalates the threat by enabling these users to bypass intended restrictions. The uploaded files can be crafted to include malicious code, potentially leading to remote code execution (RCE) on the server hosting the WordPress site. The CVSS 3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with low attack complexity, no user interaction needed, and requiring only low privileges (authenticated Contributor). The vulnerability affects all versions up to and including 0.1 of the plugin, with no patch currently available. Although no exploits have been reported in the wild, the risk remains significant due to the ease of exploitation and potential for severe damage. The vulnerability was reserved on 2025-10-24 and published on 2025-12-05, indicating recent discovery and disclosure. This flaw is particularly dangerous for WordPress sites that allow Contributor-level users to upload images via URL using this plugin, as it can be leveraged to gain unauthorized server access and control.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to websites running WordPress with the affected plugin installed. Exploitation can lead to unauthorized remote code execution, resulting in data breaches, defacement, service disruption, or full server compromise. Organizations in sectors relying heavily on web presence, such as media, e-commerce, education, and government, face heightened risks. Confidential information stored or processed by the site could be exposed or altered, damaging reputation and compliance with data protection regulations like GDPR. The availability of the website may be impacted through denial-of-service or malicious payload execution. Since Contributor-level users can exploit this, insider threats or compromised accounts increase the attack surface. The lack of a patch means organizations must rely on immediate mitigations to prevent exploitation. The vulnerability's network attack vector and no requirement for user interaction make it a viable target for automated attacks, increasing the likelihood of exploitation in the European threat landscape.
Mitigation Recommendations
1. Immediately restrict or disable the 'Featured Image via URL' plugin until a security patch is released by the vendor. 2. Limit Contributor-level user permissions strictly, ensuring only trusted users have such access. 3. Implement web application firewalls (WAF) with rules to detect and block suspicious file upload attempts, especially those targeting the plugin's upload endpoints. 4. Employ server-side file type validation and scanning to detect and quarantine potentially malicious files uploaded via the plugin. 5. Monitor logs for unusual file upload activity or unexpected file types being uploaded by Contributor users. 6. Use intrusion detection/prevention systems (IDS/IPS) to identify exploitation attempts. 7. Harden WordPress installations by disabling unnecessary plugins and enforcing the principle of least privilege. 8. Prepare incident response plans to quickly isolate and remediate compromised systems if exploitation occurs. 9. Stay updated with vendor advisories and apply patches immediately once available. 10. Consider alternative plugins with robust security practices for image uploads.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-24T13:03:55.950Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327172f88dbe026c77990d
Added to database: 12/5/2025, 5:45:22 AM
Last enriched: 12/5/2025, 6:00:31 AM
Last updated: 12/9/2025, 6:45:55 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65573: n/a
UnknownCVE-2025-14334: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-11531: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in HP Inc HP System Event Utility
MediumCVE-2025-64894: Integer Overflow or Wraparound (CWE-190) in Adobe DNG SDK
MediumCVE-2025-64893: Out-of-bounds Read (CWE-125) in Adobe DNG SDK
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.