Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12563: CWE-862 Missing Authorization in pr-gateway Blog2Social: Social Media Auto Post & Scheduler

0
Medium
VulnerabilityCVE-2025-12563cvecve-2025-12563cwe-862
Published: Thu Nov 06 2025 (11/06/2025, 04:36:21 UTC)
Source: CVE Database V5
Vendor/Project: pr-gateway
Product: Blog2Social: Social Media Auto Post & Scheduler

Description

The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to limited file upload due to an incorrect capability check on theuploadVideo() function in all versions up to, and including, 8.6.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload mp4 files to the 'wp-content/uploads/<YYYY>/<MM>/' directory.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:44:59 UTC

Technical Analysis

CVE-2025-12563 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress. The flaw exists in the uploadVideo() function, where an incorrect capability check allows authenticated users with as low as Subscriber-level privileges to upload mp4 files to the wp-content/uploads/<YYYY>/<MM>/ directory. This improper authorization bypass means that users who normally should not have upload permissions can place files on the server. Although the vulnerability does not directly allow remote code execution or disclosure of sensitive information, the ability to upload files can be leveraged for further attacks such as hosting malicious media or attempting to escalate privileges through chained exploits. The CVSS v3.1 base score is 4.3 (medium), reflecting the network attack vector, low complexity, and the requirement for privileges but no user interaction. The vulnerability affects all plugin versions up to 8.6.0, with no patches currently linked. No known exploits have been reported in the wild, but the risk remains due to the potential for misuse by authenticated users. The vulnerability highlights the importance of proper authorization checks in WordPress plugins, especially those handling file uploads.

Potential Impact

The primary impact of this vulnerability is on the integrity of the affected WordPress sites. Authenticated users with Subscriber-level access or higher can upload mp4 files to the server, which could be used to store malicious content or attempt further exploitation. While direct confidentiality and availability impacts are not evident, the ability to upload files may facilitate indirect attacks such as hosting malware, phishing content, or attempting privilege escalation through chained vulnerabilities. For organizations, this could lead to reputational damage, potential defacement, or use of the compromised site as a vector for broader attacks. Since WordPress is widely used globally, sites using this plugin without proper access controls or monitoring are at risk. The requirement for authentication limits the attack surface but does not eliminate risk, especially in environments with many registered users or weak account controls.

Mitigation Recommendations

1. Immediately update the Blog2Social plugin to a patched version once available from the vendor to ensure proper authorization checks are enforced. 2. Until a patch is released, restrict user roles that have upload capabilities and review user permissions to limit Subscriber-level users from uploading files. 3. Implement strict file type validation and scanning on uploaded media files to detect and block malicious content. 4. Monitor the wp-content/uploads directory for unusual or unauthorized file uploads, especially mp4 files uploaded by low-privilege users. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized upload attempts. 6. Harden WordPress installations by disabling file execution in upload directories via .htaccess or server configuration to prevent execution of uploaded files. 7. Conduct regular audits of user accounts and remove or restrict unnecessary accounts to reduce the number of potential attackers. 8. Educate site administrators about the risks of granting upload permissions and the importance of applying security updates promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-31T19:07:24.936Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690c27e36cabeda23dacfe9e

Added to database: 11/6/2025, 4:45:23 AM

Last enriched: 2/27/2026, 8:44:59 PM

Last updated: 3/25/2026, 12:15:11 AM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses