CVE-2025-12900: CWE-862 Missing Authorization in ninjateam FileBird – WordPress Media Library Folders & File Manager
The FileBird – WordPress Media Library Folders & File Manager plugin for WordPress is vulnerable to missing authorization in all versions up to, and including, 6.5.1 via the "ConvertController::insertToNewTable" function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with author level access and above, to inject global folders and reassign arbitrary media attachments to those folders under certain circumstances.
AI Analysis
Technical Summary
CVE-2025-12900 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the FileBird – WordPress Media Library Folders & File Manager plugin up to version 6.5.1. The issue arises in the ConvertController::insertToNewTable function, where a user-controlled key is not properly validated, allowing authenticated users with author-level privileges or higher to inject global folders and reassign arbitrary media attachments. This missing authorization check means that users who should only have limited control over media organization can escalate their privileges within the media library context, potentially disrupting media management workflows or causing confusion by reassigning media files to folders they do not own or control. The vulnerability is exploitable remotely over the network without requiring user interaction, but it does require authentication at the author level or above, which limits the attack surface to users with some level of trust within the WordPress environment. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but a clear impact on integrity. No public exploits have been reported so far, and no patches were linked in the provided data, indicating that mitigation may rely on vendor updates or manual access control reviews. The vulnerability is significant for websites relying on FileBird for media management, especially those with multiple authors or contributors, as it could be used to manipulate media assets improperly.
Potential Impact
For European organizations, the primary impact of CVE-2025-12900 lies in the integrity of media assets managed via WordPress sites using the FileBird plugin. Unauthorized reassignment of media files can disrupt content management, potentially leading to incorrect or misleading media presentation on public-facing websites. This could affect brand reputation, user experience, and content accuracy. While the vulnerability does not expose sensitive data or cause denial of service, it could be leveraged by malicious insiders or compromised author accounts to manipulate media content maliciously or cause operational confusion. Organizations with multiple content creators or collaborative publishing workflows are at higher risk. Additionally, websites that rely heavily on media assets for marketing, e-commerce, or customer engagement may find this vulnerability undermines their content governance. Given the widespread use of WordPress across Europe, especially in sectors like media, education, and small to medium enterprises, the vulnerability could have broad implications if exploited.
Mitigation Recommendations
To mitigate CVE-2025-12900, organizations should first verify if they use the FileBird plugin and identify the version in use. Immediate steps include restricting author-level permissions to trusted users only and auditing existing author accounts for suspicious activity. Until an official patch is released, consider disabling or removing the FileBird plugin if feasible, or limiting its use to administrators only. Implement strict role-based access controls (RBAC) within WordPress to minimize the number of users with author-level or higher privileges. Monitor media library changes and folder assignments for unusual activity, leveraging WordPress audit logging plugins if available. Additionally, keep WordPress core and all plugins updated regularly and subscribe to vendor security advisories for timely patch releases. For organizations with complex media workflows, consider isolating media management functions or using alternative plugins with stronger authorization controls. Finally, educate content creators about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of account compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-12900: CWE-862 Missing Authorization in ninjateam FileBird – WordPress Media Library Folders & File Manager
Description
The FileBird – WordPress Media Library Folders & File Manager plugin for WordPress is vulnerable to missing authorization in all versions up to, and including, 6.5.1 via the "ConvertController::insertToNewTable" function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with author level access and above, to inject global folders and reassign arbitrary media attachments to those folders under certain circumstances.
AI-Powered Analysis
Technical Analysis
CVE-2025-12900 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the FileBird – WordPress Media Library Folders & File Manager plugin up to version 6.5.1. The issue arises in the ConvertController::insertToNewTable function, where a user-controlled key is not properly validated, allowing authenticated users with author-level privileges or higher to inject global folders and reassign arbitrary media attachments. This missing authorization check means that users who should only have limited control over media organization can escalate their privileges within the media library context, potentially disrupting media management workflows or causing confusion by reassigning media files to folders they do not own or control. The vulnerability is exploitable remotely over the network without requiring user interaction, but it does require authentication at the author level or above, which limits the attack surface to users with some level of trust within the WordPress environment. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited impact on confidentiality and availability but a clear impact on integrity. No public exploits have been reported so far, and no patches were linked in the provided data, indicating that mitigation may rely on vendor updates or manual access control reviews. The vulnerability is significant for websites relying on FileBird for media management, especially those with multiple authors or contributors, as it could be used to manipulate media assets improperly.
Potential Impact
For European organizations, the primary impact of CVE-2025-12900 lies in the integrity of media assets managed via WordPress sites using the FileBird plugin. Unauthorized reassignment of media files can disrupt content management, potentially leading to incorrect or misleading media presentation on public-facing websites. This could affect brand reputation, user experience, and content accuracy. While the vulnerability does not expose sensitive data or cause denial of service, it could be leveraged by malicious insiders or compromised author accounts to manipulate media content maliciously or cause operational confusion. Organizations with multiple content creators or collaborative publishing workflows are at higher risk. Additionally, websites that rely heavily on media assets for marketing, e-commerce, or customer engagement may find this vulnerability undermines their content governance. Given the widespread use of WordPress across Europe, especially in sectors like media, education, and small to medium enterprises, the vulnerability could have broad implications if exploited.
Mitigation Recommendations
To mitigate CVE-2025-12900, organizations should first verify if they use the FileBird plugin and identify the version in use. Immediate steps include restricting author-level permissions to trusted users only and auditing existing author accounts for suspicious activity. Until an official patch is released, consider disabling or removing the FileBird plugin if feasible, or limiting its use to administrators only. Implement strict role-based access controls (RBAC) within WordPress to minimize the number of users with author-level or higher privileges. Monitor media library changes and folder assignments for unusual activity, leveraging WordPress audit logging plugins if available. Additionally, keep WordPress core and all plugins updated regularly and subscribe to vendor security advisories for timely patch releases. For organizations with complex media workflows, consider isolating media management functions or using alternative plugins with stronger authorization controls. Finally, educate content creators about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of account compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-07T19:36:21.772Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69401ef9d9bcdf3f3de1277a
Added to database: 12/15/2025, 2:45:13 PM
Last enriched: 12/15/2025, 3:02:47 PM
Last updated: 12/17/2025, 11:46:15 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14837: Code Injection in ZZCMS
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumCVE-2025-14834: SQL Injection in code-projects Simple Stock System
MediumCVE-2025-68435: CWE-305: Authentication Bypass by Primary Weakness in nicotsx zerobyte
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.