Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12384: CWE-862 Missing Authorization in bplugins Document Embedder – Embed PDFs, Word, Excel, and Other Files

0
High
VulnerabilityCVE-2025-12384cvecve-2025-12384cwe-862
Published: Wed Nov 05 2025 (11/05/2025, 06:35:02 UTC)
Source: CVE Database V5
Vendor/Project: bplugins
Product: Document Embedder – Embed PDFs, Word, Excel, and Other Files

Description

The Document Embedder – Embed PDFs, Word, Excel, and Other Files plugin for WordPress is vulnerable to unauthorized access/modification/loss of data in all versions up to, and including, 2.0.0. This is due to the plugin not properly verifying that a user is authorized to perform an action in the "bplde_save_document_library", "bplde_get_all", "bplde_get_single", and "bplde_delete_document_library" functions. This makes it possible for unauthenticated attackers to create, read, update, and delete arbitrary document_library posts.

AI-Powered Analysis

AILast updated: 11/12/2025, 08:06:59 UTC

Technical Analysis

CVE-2025-12384 is a critical authorization bypass vulnerability identified in the 'Document Embedder – Embed PDFs, Word, Excel, and Other Files' WordPress plugin developed by bplugins. The vulnerability stems from the plugin's failure to verify user authorization in several key functions: 'bplde_save_document_library', 'bplde_get_all', 'bplde_get_single', and 'bplde_delete_document_library'. These functions handle creation, retrieval, updating, and deletion of document_library posts, which are custom post types used by the plugin to embed various document formats within WordPress sites. Because the plugin does not enforce proper permission checks, unauthenticated attackers can perform unauthorized actions on these posts, effectively allowing them to manipulate embedded documents arbitrarily. The CVSS 3.1 base score of 8.6 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), high integrity impact (I:H), and low availability impact (A:L). This means the vulnerability can be exploited remotely without credentials or user interaction, potentially leading to significant data integrity compromise and some confidentiality loss. Although no exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a high-risk issue for WordPress sites using this plugin. The lack of available patches at the time of disclosure increases the urgency for interim protective measures. Organizations relying on this plugin should prioritize risk assessment and mitigation to prevent unauthorized document manipulation and potential data breaches.

Potential Impact

For European organizations, the impact of CVE-2025-12384 can be substantial, particularly for those using WordPress sites with the affected Document Embedder plugin to manage sensitive or regulated documents. Unauthorized creation, modification, or deletion of embedded documents can lead to data integrity issues, loss of critical business information, and exposure of confidential data. This could result in compliance violations under GDPR and other data protection regulations, leading to legal and financial penalties. The ability for unauthenticated attackers to exploit this vulnerability remotely increases the risk of widespread attacks, including defacement, misinformation, or sabotage of corporate content. Organizations in sectors such as finance, healthcare, government, and legal services, where document integrity and confidentiality are paramount, face heightened risks. Additionally, reputational damage from data breaches or content tampering could undermine customer trust and business continuity. The vulnerability's exploitation could also serve as a foothold for further attacks within the network if attackers leverage compromised WordPress sites as pivot points.

Mitigation Recommendations

Immediate mitigation steps include disabling or removing the vulnerable plugin until a security patch is released by the vendor. If removal is not feasible, restrict access to WordPress administrative and plugin-related endpoints using IP whitelisting, web application firewalls (WAFs), or reverse proxies to limit exposure to unauthenticated users. Implement strict monitoring and logging of all document_library post-related activities to detect suspicious creation, modification, or deletion attempts. Employ intrusion detection systems (IDS) and security plugins that can alert on anomalous behavior. Regularly audit user roles and permissions within WordPress to ensure least privilege principles are enforced. Once a patch becomes available, apply it promptly and verify that authorization checks are correctly enforced in the affected functions. Additionally, conduct security awareness training for site administrators on plugin risks and update management best practices. Consider isolating critical WordPress instances in segmented network zones to reduce lateral movement risks in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-28T11:35:02.879Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690af19c063e7c5f011fbd4a

Added to database: 11/5/2025, 6:41:32 AM

Last enriched: 11/12/2025, 8:06:59 AM

Last updated: 12/20/2025, 5:29:21 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats