Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12847: CWE-862 Missing Authorization in smub All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic

0
Medium
VulnerabilityCVE-2025-12847cvecve-2025-12847cwe-862
Published: Sat Nov 15 2025 (11/15/2025, 05:45:32 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic

Description

The All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic plugin for WordPress is vulnerable to unauthorized arbitrary media attachment deletion due to a missing authorization check in all versions up to, and including, 4.8.9. This is due to the REST API endpoint `/wp-json/aioseo/v1/ai/image-generator` only verifying that users have the `edit_posts` capability (Contributors and above) without checking if they own or have permission to delete the specific media attachments. This makes it possible for authenticated attackers, with Contributor-level access and above, to permanently delete arbitrary media attachments by ID via the REST API, granted they can determine valid attachment IDs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:14:59 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12847 affects the All in One SEO plugin for WordPress, a widely used SEO tool designed to improve site rankings and traffic. The issue arises from a missing authorization check in the REST API endpoint /wp-json/aioseo/v1/ai/image-generator. This endpoint validates that a user has the edit_posts capability, which is granted to Contributors and above, but fails to verify whether the user actually owns or has permission to delete the targeted media attachments. Consequently, any authenticated user with Contributor-level access or higher can delete arbitrary media attachments by specifying their IDs, assuming they can enumerate or guess valid attachment IDs. This vulnerability is classified under CWE-862 (Missing Authorization) and has a CVSS 3.1 base score of 4.3, indicating medium severity. The impact is limited to integrity as it allows unauthorized deletion of media files, but does not affect confidentiality or availability. The vulnerability affects all versions up to and including 4.8.9 of the plugin. No patches or fixes are currently linked, and no active exploitation has been reported. The attack vector is network-based, requiring only low privileges and no user interaction, making it relatively easy to exploit within compromised or multi-user environments. The scope is limited to WordPress sites using this plugin and having users with Contributor or higher roles.

Potential Impact

The primary impact of CVE-2025-12847 is unauthorized deletion of media attachments, which can disrupt website content integrity and user experience. For organizations relying on WordPress sites with the All in One SEO plugin, this could lead to loss of important images or media assets, potentially affecting marketing materials, product images, or other critical content. Although the vulnerability does not directly compromise confidentiality or availability, the integrity loss can result in reputational damage, operational disruption, and increased recovery costs. In multi-user environments such as large organizations, educational institutions, or agencies where multiple contributors have access, the risk of insider threat or compromised contributor accounts exploiting this flaw is significant. Attackers with Contributor-level access could leverage this to sabotage content or cause persistent damage. Since the vulnerability requires authenticated access, the impact is mitigated somewhat by existing access controls, but weak credential management or compromised accounts increase risk. The absence of patches means organizations must rely on compensating controls until updates are available.

Mitigation Recommendations

To mitigate CVE-2025-12847, organizations should first monitor and restrict Contributor-level and higher user roles to trusted personnel only, minimizing the attack surface. Implement strict credential hygiene, including strong passwords and multi-factor authentication, to reduce the risk of account compromise. Temporarily disable or restrict access to the vulnerable REST API endpoint using web application firewalls (WAFs) or custom rules that block or limit requests to /wp-json/aioseo/v1/ai/image-generator. Regularly audit media attachments and maintain backups to enable recovery from unauthorized deletions. Administrators should keep the All in One SEO plugin updated and monitor vendor communications for forthcoming patches or security advisories. If feasible, consider replacing or supplementing the plugin with alternative SEO tools that have stronger authorization controls. Additionally, implement logging and alerting on media deletion events to detect suspicious activity promptly. Employ the principle of least privilege by reviewing and minimizing user capabilities within WordPress to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-06T21:04:39.818Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6918143b93cc35e7aa3af0eb

Added to database: 11/15/2025, 5:48:43 AM

Last enriched: 2/27/2026, 9:14:59 PM

Last updated: 3/26/2026, 9:17:50 AM

Views: 188

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses