Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12384: CWE-862 Missing Authorization in bplugins Document Embedder – Embed PDFs, Word, Excel, and Other Files

0
High
VulnerabilityCVE-2025-12384cvecve-2025-12384cwe-862
Published: Wed Nov 05 2025 (11/05/2025, 06:35:02 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: Document Embedder – Embed PDFs, Word, Excel, and Other Files

Description

The Document Embedder – Embed PDFs, Word, Excel, and Other Files plugin for WordPress is vulnerable to unauthorized access/modification/loss of data in all versions up to, and including, 2.0.0. This is due to the plugin not properly verifying that a user is authorized to perform an action in the "bplde_save_document_library", "bplde_get_all", "bplde_get_single", and "bplde_delete_document_library" functions. This makes it possible for unauthenticated attackers to create, read, update, and delete arbitrary document_library posts.

AI-Powered Analysis

AILast updated: 11/05/2025, 06:56:26 UTC

Technical Analysis

CVE-2025-12384 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the 'Document Embedder – Embed PDFs, Word, Excel, and Other Files' WordPress plugin developed by bplugins. The vulnerability exists because the plugin fails to verify user authorization in several critical functions: 'bplde_save_document_library', 'bplde_get_all', 'bplde_get_single', and 'bplde_delete_document_library'. These functions manage the creation, retrieval, updating, and deletion of document_library posts, which represent embedded documents such as PDFs, Word, and Excel files. Due to the lack of proper authorization checks, unauthenticated attackers can remotely invoke these functions to manipulate document libraries arbitrarily. This means attackers can upload malicious documents, exfiltrate sensitive embedded files, modify existing content, or delete documents, leading to data loss and potential defacement. The vulnerability affects all versions up to and including 2.0.0 of the plugin. The CVSS 3.1 base score is 8.6, reflecting high severity with network attack vector, no privileges or user interaction required, and impacts on confidentiality (low), integrity (high), and availability (low). No patches or exploits are currently publicly available, but the vulnerability is published and should be considered exploitable given the ease of attack and lack of authentication barriers.

Potential Impact

For European organizations, this vulnerability poses significant risks to the confidentiality, integrity, and availability of embedded documents on WordPress websites using the affected plugin. Sensitive corporate documents, internal reports, or client data embedded via this plugin could be exposed or altered by attackers, leading to data breaches, reputational damage, and potential regulatory non-compliance under GDPR. The ability to delete or modify embedded documents can disrupt business operations, especially for organizations relying on these documents for customer interactions or internal workflows. Attackers could also leverage this vulnerability to inject malicious content or links, facilitating further compromise or phishing attacks. Given the widespread use of WordPress in Europe across sectors such as government, education, and commerce, the impact could be broad, affecting both public-facing and internal sites. The lack of authentication requirements lowers the barrier for exploitation, increasing the likelihood of attacks if the vulnerability is not promptly addressed.

Mitigation Recommendations

1. Immediately audit all WordPress installations for the presence of the 'Document Embedder – Embed PDFs, Word, Excel, and Other Files' plugin and identify affected versions (up to 2.0.0). 2. Disable or uninstall the plugin until an official patch or update addressing CVE-2025-12384 is released by bplugins. 3. Monitor official bplugins channels and WordPress plugin repositories for security updates and apply patches promptly once available. 4. Implement web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting the vulnerable functions, especially those attempting unauthorized document library operations. 5. Conduct regular security reviews of WordPress plugins focusing on authorization controls to prevent similar vulnerabilities. 6. Restrict access to WordPress admin and plugin endpoints via IP whitelisting or VPN where feasible to reduce exposure. 7. Maintain regular backups of WordPress content and embedded documents to enable recovery in case of data loss or tampering. 8. Educate site administrators on the risks of installing unverified plugins and the importance of timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-28T11:35:02.879Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690af19c063e7c5f011fbd4a

Added to database: 11/5/2025, 6:41:32 AM

Last enriched: 11/5/2025, 6:56:26 AM

Last updated: 11/5/2025, 10:00:20 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats