CVE-2025-12847: CWE-862 Missing Authorization in smub All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic
The All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic plugin for WordPress is vulnerable to unauthorized arbitrary media attachment deletion due to a missing authorization check in all versions up to, and including, 4.8.9. This is due to the REST API endpoint `/wp-json/aioseo/v1/ai/image-generator` only verifying that users have the `edit_posts` capability (Contributors and above) without checking if they own or have permission to delete the specific media attachments. This makes it possible for authenticated attackers, with Contributor-level access and above, to permanently delete arbitrary media attachments by ID via the REST API, granted they can determine valid attachment IDs.
AI Analysis
Technical Summary
CVE-2025-12847 is a missing authorization vulnerability (CWE-862) affecting all versions up to 4.8.9 of the All in One SEO – Powerful SEO Plugin for WordPress. The vulnerability exists in the REST API endpoint /wp-json/aioseo/v1/ai/image-generator, which allows authenticated users with the edit_posts capability (typically Contributors and above) to delete media attachments arbitrarily. The plugin fails to verify whether the user owns or has explicit permission to delete the targeted media attachment, relying solely on the general capability check. This means that any authenticated user with contributor-level access can supply a valid media attachment ID and cause permanent deletion of that media item. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, reflecting low complexity and limited impact on confidentiality and availability but a direct impact on integrity due to unauthorized deletion of media. No patches or exploits are currently publicly available, but the vulnerability poses a risk to website content integrity and operational continuity, especially for sites relying heavily on media assets. The flaw highlights the importance of fine-grained authorization checks beyond capability verification in REST API endpoints.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized deletion of critical media assets such as images, videos, or documents hosted on WordPress sites using the affected plugin. This can disrupt website appearance, degrade user experience, and potentially cause loss of important marketing or informational content. Organizations in sectors relying on rich media content for customer engagement, e-commerce, or brand reputation are particularly at risk. Although the vulnerability does not expose sensitive data or cause denial of service, the integrity loss can lead to reputational damage and operational overhead to restore deleted content. Attackers with contributor-level access could be internal users or compromised accounts, increasing the risk of insider threats or lateral movement within the CMS environment. Given the widespread use of WordPress and the popularity of the All in One SEO plugin, the threat surface is significant across European businesses, especially SMEs and digital agencies that may have less mature access controls.
Mitigation Recommendations
Immediate mitigation should include restricting contributor-level user roles from accessing the vulnerable REST API endpoint by implementing custom access controls or disabling the endpoint if not required. Administrators should audit user roles and permissions to ensure that only trusted users have contributor or higher privileges. Applying the vendor patch as soon as it becomes available is critical. In the absence of an official patch, organizations can implement Web Application Firewall (WAF) rules to block or monitor suspicious REST API calls targeting /wp-json/aioseo/v1/ai/image-generator. Regular backups of media content should be maintained to enable quick restoration in case of deletion. Monitoring and alerting on unusual media deletion activities can help detect exploitation attempts. Additionally, organizations should consider implementing multi-factor authentication and stronger user verification to reduce the risk of compromised accounts being used to exploit this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-12847: CWE-862 Missing Authorization in smub All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic
Description
The All in One SEO – Powerful SEO Plugin to Boost SEO Rankings & Increase Traffic plugin for WordPress is vulnerable to unauthorized arbitrary media attachment deletion due to a missing authorization check in all versions up to, and including, 4.8.9. This is due to the REST API endpoint `/wp-json/aioseo/v1/ai/image-generator` only verifying that users have the `edit_posts` capability (Contributors and above) without checking if they own or have permission to delete the specific media attachments. This makes it possible for authenticated attackers, with Contributor-level access and above, to permanently delete arbitrary media attachments by ID via the REST API, granted they can determine valid attachment IDs.
AI-Powered Analysis
Technical Analysis
CVE-2025-12847 is a missing authorization vulnerability (CWE-862) affecting all versions up to 4.8.9 of the All in One SEO – Powerful SEO Plugin for WordPress. The vulnerability exists in the REST API endpoint /wp-json/aioseo/v1/ai/image-generator, which allows authenticated users with the edit_posts capability (typically Contributors and above) to delete media attachments arbitrarily. The plugin fails to verify whether the user owns or has explicit permission to delete the targeted media attachment, relying solely on the general capability check. This means that any authenticated user with contributor-level access can supply a valid media attachment ID and cause permanent deletion of that media item. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, reflecting low complexity and limited impact on confidentiality and availability but a direct impact on integrity due to unauthorized deletion of media. No patches or exploits are currently publicly available, but the vulnerability poses a risk to website content integrity and operational continuity, especially for sites relying heavily on media assets. The flaw highlights the importance of fine-grained authorization checks beyond capability verification in REST API endpoints.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized deletion of critical media assets such as images, videos, or documents hosted on WordPress sites using the affected plugin. This can disrupt website appearance, degrade user experience, and potentially cause loss of important marketing or informational content. Organizations in sectors relying on rich media content for customer engagement, e-commerce, or brand reputation are particularly at risk. Although the vulnerability does not expose sensitive data or cause denial of service, the integrity loss can lead to reputational damage and operational overhead to restore deleted content. Attackers with contributor-level access could be internal users or compromised accounts, increasing the risk of insider threats or lateral movement within the CMS environment. Given the widespread use of WordPress and the popularity of the All in One SEO plugin, the threat surface is significant across European businesses, especially SMEs and digital agencies that may have less mature access controls.
Mitigation Recommendations
Immediate mitigation should include restricting contributor-level user roles from accessing the vulnerable REST API endpoint by implementing custom access controls or disabling the endpoint if not required. Administrators should audit user roles and permissions to ensure that only trusted users have contributor or higher privileges. Applying the vendor patch as soon as it becomes available is critical. In the absence of an official patch, organizations can implement Web Application Firewall (WAF) rules to block or monitor suspicious REST API calls targeting /wp-json/aioseo/v1/ai/image-generator. Regular backups of media content should be maintained to enable quick restoration in case of deletion. Monitoring and alerting on unusual media deletion activities can help detect exploitation attempts. Additionally, organizations should consider implementing multi-factor authentication and stronger user verification to reduce the risk of compromised accounts being used to exploit this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-06T21:04:39.818Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6918143b93cc35e7aa3af0eb
Added to database: 11/15/2025, 5:48:43 AM
Last enriched: 11/22/2025, 8:31:01 AM
Last updated: 1/7/2026, 8:46:47 AM
Views: 146
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.