Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12563: CWE-862 Missing Authorization in pr-gateway Blog2Social: Social Media Auto Post & Scheduler

0
Medium
VulnerabilityCVE-2025-12563cvecve-2025-12563cwe-862
Published: Thu Nov 06 2025 (11/06/2025, 04:36:21 UTC)
Source: CVE Database V5
Vendor/Project: pr-gateway
Product: Blog2Social: Social Media Auto Post & Scheduler

Description

The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to limited file upload due to an incorrect capability check on theuploadVideo() function in all versions up to, and including, 8.6.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload mp4 files to the 'wp-content/uploads/<YYYY>/<MM>/' directory.

AI-Powered Analysis

AILast updated: 11/13/2025, 05:27:23 UTC

Technical Analysis

CVE-2025-12563 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress, versions up to and including 8.6.0. The vulnerability stems from an incorrect capability check in the uploadVideo() function, which fails to properly verify if the authenticated user has sufficient privileges before allowing file uploads. As a result, any authenticated user with Subscriber-level access or higher can upload mp4 files to the 'wp-content/uploads/<YYYY>/<MM>/' directory. This limited file upload capability does not directly allow execution of arbitrary code or disclosure of sensitive information but can be leveraged to upload unauthorized media files that may be used for further attacks such as hosting malicious content or facilitating social engineering. The CVSS 3.1 base score is 4.3 (medium severity), reflecting the network attack vector, low complexity, and requirement for privileges but no user interaction. No known exploits have been reported in the wild as of the publication date. The vulnerability affects all versions of the plugin up to 8.6.0, and no official patches have been linked yet. The issue highlights the importance of proper authorization checks in plugin functions that handle file uploads, especially in widely used CMS platforms like WordPress.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity of their WordPress-based websites. Attackers with low-level authenticated access (Subscriber or above) can upload mp4 files, potentially enabling them to host unauthorized or malicious media content. While this does not directly compromise confidentiality or availability, it could be exploited to facilitate phishing, malware distribution, or defacement campaigns. Organizations in sectors relying heavily on WordPress for marketing, media, or communication may face reputational damage if attackers misuse this vulnerability. Additionally, attackers might use the uploaded files as a foothold for further attacks if combined with other vulnerabilities or misconfigurations. The lack of known exploits reduces immediate risk, but the ease of exploitation and widespread use of the plugin necessitate proactive mitigation. European entities must consider this vulnerability in their web security posture, especially those with public-facing WordPress sites using the affected plugin.

Mitigation Recommendations

1. Immediately restrict access to the Blog2Social plugin settings and functionalities to trusted users only, minimizing the number of users with Subscriber-level or higher access. 2. Monitor the 'wp-content/uploads/' directories for unusual or unauthorized mp4 file uploads, using file integrity monitoring tools or custom scripts. 3. Implement web application firewall (WAF) rules to detect and block suspicious file upload attempts targeting the plugin's uploadVideo() function endpoints. 4. Disable or uninstall the Blog2Social plugin if it is not essential, or replace it with alternative plugins that have verified secure authorization controls. 5. Regularly audit user roles and permissions in WordPress to ensure minimal privilege principles are enforced, reducing the attack surface. 6. Stay alert for official patches or updates from the plugin vendor and apply them promptly once released. 7. Consider additional hardening measures such as disabling direct execution of media files in upload directories via web server configuration to mitigate potential misuse. 8. Educate site administrators about this vulnerability and encourage vigilance regarding suspicious user activities and file uploads.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-31T19:07:24.936Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690c27e36cabeda23dacfe9e

Added to database: 11/6/2025, 4:45:23 AM

Last enriched: 11/13/2025, 5:27:23 AM

Last updated: 12/21/2025, 3:16:12 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats