Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12153: CWE-434 Unrestricted Upload of File with Dangerous Type in tsaiid Featured Image via URL

0
High
VulnerabilityCVE-2025-12153cvecve-2025-12153cwe-434
Published: Fri Dec 05 2025 (12/05/2025, 05:31:26 UTC)
Source: CVE Database V5
Vendor/Project: tsaiid
Product: Featured Image via URL

Description

The Featured Image via URL plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation function in all versions up to, and including, 0.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 12/12/2025, 06:07:34 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12153 affects the 'Featured Image via URL' WordPress plugin developed by tsaiid, present in all versions up to and including 0.1. The core issue is the absence of proper file type validation during file uploads, categorized under CWE-434. This flaw allows authenticated users with Contributor-level access or higher to upload arbitrary files to the web server hosting the WordPress site. Because the plugin does not restrict or validate the file types, attackers can upload malicious files such as web shells or scripts that can be executed remotely, potentially leading to full remote code execution (RCE). The attack vector requires authentication but no user interaction beyond the attacker's own actions. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to the widespread use of WordPress and the common assignment of Contributor roles to users who can upload content. The vulnerability was reserved on 2025-10-24 and published on 2025-12-05, with no patches currently available, increasing the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability can lead to severe consequences including unauthorized access to sensitive data, defacement of websites, deployment of malware, and potential lateral movement within the network if the attacker gains a foothold via remote code execution. Organizations relying on WordPress for their public-facing websites or intranet portals that use the affected plugin are at risk of service disruption and reputational damage. The ability for relatively low-privileged users to escalate their impact by uploading executable files increases insider threat risks and complicates access control policies. Given the high adoption rate of WordPress in Europe, especially among SMEs and public sector entities, the threat could affect a broad range of sectors including government, education, healthcare, and e-commerce. The lack of a patch and the ease of exploitation heighten the urgency for proactive defense measures.

Mitigation Recommendations

Immediate mitigation steps include disabling the 'Featured Image via URL' plugin until a secure patch is released. Organizations should audit user roles and permissions, restricting Contributor-level access to trusted users only. Implementing Web Application Firewalls (WAF) with rules to detect and block suspicious file uploads can provide an additional layer of defense. Monitoring server logs for unusual file upload activity and scanning uploaded files for malicious content is critical. Employing file integrity monitoring and restricting execution permissions on upload directories can reduce the risk of remote code execution. Organizations should also ensure WordPress core and all plugins are kept up to date and consider deploying security plugins that enforce strict file upload policies. Finally, educating content contributors about security best practices can help reduce accidental exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T13:03:55.950Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69327172f88dbe026c77990d

Added to database: 12/5/2025, 5:45:22 AM

Last enriched: 12/12/2025, 6:07:34 AM

Last updated: 2/7/2026, 8:02:59 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats