Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13419: CWE-862 Missing Authorization in aharonyan Guest posting / Frontend Posting / Front Editor – WP Front User Submit

0
Medium
VulnerabilityCVE-2025-13419cvecve-2025-13419cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 09:21:00 UTC)
Source: CVE Database V5
Vendor/Project: aharonyan
Product: Guest posting / Frontend Posting / Front Editor – WP Front User Submit

Description

The Guest posting / Frontend Posting / Front Editor – WP Front User Submit plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the '/wp-json/bfe/v1/revert' REST API endpoint in all versions up to, and including, 5.0.0. This makes it possible for unauthenticated attackers to delete arbitrary media attachments.

AI-Powered Analysis

AILast updated: 01/07/2026, 12:07:39 UTC

Technical Analysis

CVE-2025-13419 is a vulnerability identified in the WP Front User Submit plugin for WordPress, specifically in the Guest posting / Frontend Posting / Front Editor functionality. The root cause is a missing authorization (capability) check on the REST API endpoint '/wp-json/bfe/v1/revert'. This endpoint is intended to allow authorized users to revert changes or delete media attachments. However, due to the lack of proper capability verification, unauthenticated attackers can invoke this endpoint to delete arbitrary media files without any authentication or user interaction. The vulnerability affects all plugin versions up to and including 5.0.0. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the fact that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), but impacts integrity only (I:L) without affecting confidentiality or availability. The scope remains unchanged (S:U), meaning the impact is limited to the vulnerable component. Although no public exploits are known, the vulnerability could be leveraged to deface websites, remove critical media assets, or disrupt content management workflows. The plugin is popular among WordPress sites that enable frontend user submissions, making it a relevant target for attackers aiming to manipulate site content. The vulnerability underscores the importance of proper authorization checks on REST API endpoints, especially those exposed publicly.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized deletion of media attachments, which can lead to data integrity loss and potential disruption of website content. Organizations relying on the WP Front User Submit plugin for user-generated content or media management may experience defacement, loss of important images or documents, and damage to their online presence and reputation. While the vulnerability does not directly compromise confidentiality or availability, the loss of media assets can affect business operations, customer trust, and compliance with data retention policies. Websites that serve as customer portals, marketing platforms, or e-commerce storefronts could face operational setbacks. Additionally, the ease of exploitation without authentication increases the risk of automated attacks or mass exploitation attempts. Given the widespread use of WordPress in Europe, especially among SMEs and content-driven organizations, the vulnerability could have a broad impact if left unmitigated.

Mitigation Recommendations

1. Immediately restrict access to the '/wp-json/bfe/v1/revert' REST API endpoint by implementing web application firewall (WAF) rules or server-level access controls to block unauthenticated requests. 2. Monitor web server and application logs for unusual or repeated calls to this endpoint to detect potential exploitation attempts. 3. If possible, disable or remove the WP Front User Submit plugin until a patched version is released. 4. Follow the plugin vendor's announcements closely and apply security patches as soon as they become available. 5. Implement a robust backup strategy for media files and website content to enable quick restoration in case of data deletion. 6. Harden WordPress REST API exposure by limiting publicly accessible endpoints and enforcing strict capability checks via custom code or security plugins. 7. Educate site administrators about the risks of installing plugins from unverified sources and the importance of timely updates. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) that can identify anomalous REST API usage patterns.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T14:56:27.616Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e4c107349d0379d7d5656

Added to database: 1/7/2026, 12:05:36 PM

Last enriched: 1/7/2026, 12:07:39 PM

Last updated: 1/9/2026, 2:06:09 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats