Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13536: CWE-434 Unrestricted Upload of File with Dangerous Type in blubrry PowerPress Podcasting plugin by Blubrry

0
High
VulnerabilityCVE-2025-13536cvecve-2025-13536cwe-434
Published: Thu Nov 27 2025 (11/27/2025, 08:27:05 UTC)
Source: CVE Database V5
Vendor/Project: blubrry
Product: PowerPress Podcasting plugin by Blubrry

Description

The Blubrry PowerPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 11.15.2. This is due to the plugin validating file extensions but not halting execution when validation fails in the 'powerpress_edit_post' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

AI-Powered Analysis

AILast updated: 12/04/2025, 09:17:49 UTC

Technical Analysis

CVE-2025-13536 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the Blubrry PowerPress Podcasting plugin for WordPress. The vulnerability arises from insufficient validation of uploaded file types in the 'powerpress_edit_post' function. Although the plugin performs file extension checks, it does not halt execution when these checks fail, allowing authenticated users with Contributor-level access or higher to upload arbitrary files to the server. This can lead to remote code execution (RCE) if malicious files such as web shells or scripts are uploaded and executed. The vulnerability affects all versions up to and including 11.15.2. The CVSS v3.1 base score is 8.8, indicating high severity, with an attack vector of network (remote), low attack complexity, requiring privileges (Contributor or above), no user interaction, and impacting confidentiality, integrity, and availability. No patches are currently linked, and no exploits are known in the wild, but the risk remains significant due to the ease of exploitation by authenticated users. The vulnerability is particularly dangerous because Contributor-level users are common in WordPress environments, and the ability to upload arbitrary files can lead to full site compromise.

Potential Impact

For European organizations, this vulnerability poses a significant risk to WordPress sites running the Blubrry PowerPress plugin, especially those that allow multiple contributors or editors to upload content. Successful exploitation can lead to remote code execution, enabling attackers to take control of the web server, access sensitive data, deface websites, or use the compromised server as a pivot point for further attacks within the network. This can result in data breaches, service disruption, reputational damage, and potential regulatory penalties under GDPR if personal data is exposed. The impact is heightened for media companies, podcast producers, and content platforms that rely on this plugin for publishing. Since the vulnerability requires authenticated access, insider threats or compromised contributor accounts increase the risk. The lack of a patch at the time of disclosure means organizations must rely on compensating controls until updates are available.

Mitigation Recommendations

1. Immediately audit and restrict Contributor-level user permissions to only trusted individuals, minimizing the risk of malicious uploads. 2. Implement strict monitoring and logging of file uploads, especially for users with upload capabilities, to detect suspicious activity early. 3. Use web application firewalls (WAFs) with rules to block or alert on suspicious file upload patterns or execution attempts. 4. Disable or limit file execution permissions in upload directories to prevent execution of uploaded malicious files. 5. Regularly update the Blubrry PowerPress plugin and WordPress core once patches addressing this vulnerability are released. 6. Employ file integrity monitoring tools to detect unauthorized changes or uploads. 7. Consider isolating WordPress instances or using containerization to limit the blast radius of a potential compromise. 8. Educate contributors about secure upload practices and the risks of uploading untrusted files. 9. If possible, temporarily disable file upload features in the plugin until a patch is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-21T23:56:20.385Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69280bc90a6cf06979bbe46e

Added to database: 11/27/2025, 8:28:57 AM

Last enriched: 12/4/2025, 9:17:49 AM

Last updated: 1/11/2026, 8:17:37 AM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats