Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14632: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Filr – Secure document library

0
Medium
VulnerabilityCVE-2025-14632cvecve-2025-14632cwe-434
Published: Sat Jan 17 2026 (01/17/2026, 02:22:32 UTC)
Source: CVE Database V5
Vendor/Project: wpchill
Product: Filr – Secure document library

Description

CVE-2025-14632 is a medium-severity vulnerability in the wpchill Filr – Secure document library WordPress plugin, affecting all versions up to 1. 2. 11. It allows authenticated users with Administrator-level privileges or higher to upload malicious HTML files due to insufficient file type restrictions. These files can contain JavaScript that executes when accessed by users with permission to create or edit 'filr' post types, resulting in stored cross-site scripting (XSS). The vulnerability requires high privileges and no user interaction but can impact confidentiality and integrity by executing unauthorized scripts within the WordPress environment. No known exploits are currently reported in the wild. European organizations using this plugin, especially those relying on WordPress for document management, should prioritize patching or mitigating this issue. Countries with high WordPress adoption and significant use of wpchill plugins are at greater risk. Mitigation involves restricting file upload types, applying least privilege principles, and monitoring for suspicious uploads.

AI-Powered Analysis

AILast updated: 01/17/2026, 02:51:12 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14632 affects the wpchill Filr – Secure document library plugin for WordPress, specifically all versions up to and including 1.2.11. The root cause is insufficient validation and restriction of file types in the FILR_Uploader class, allowing authenticated users with Administrator-level access or higher to upload files with dangerous types, such as HTML files containing embedded JavaScript. When these malicious files are accessed by users with permissions to create or edit posts of the 'filr' post type, the embedded JavaScript executes in their browsers, constituting a stored cross-site scripting (XSS) attack. This vulnerability leverages the plugin’s document upload functionality, which is intended to securely manage documents but fails to enforce strict file type controls. The attack vector requires the attacker to have high privileges (Administrator or above) and does not require user interaction beyond accessing the malicious file. The CVSS 3.1 base score is 4.4, reflecting a medium severity with low confidentiality and integrity impact, no availability impact, high attack complexity, and requiring privileges. No public exploits have been reported yet, but the vulnerability poses a risk of session hijacking, privilege escalation, or unauthorized actions within the WordPress environment. The scope is limited to sites using this specific plugin and versions, but given WordPress’s widespread use, the potential attack surface is significant. The vulnerability is classified under CWE-434, which concerns unrestricted file upload vulnerabilities that can lead to code execution or XSS. The issue was publicly disclosed in January 2026, with no patches currently linked, emphasizing the need for immediate mitigation by affected users.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized script execution within WordPress administrative environments, potentially compromising site integrity and confidentiality. Attackers with Administrator-level access could leverage this to execute malicious JavaScript, leading to session hijacking, data theft, or further privilege escalation. Organizations relying on the wpchill Filr plugin for secure document management may face risks of document tampering or exposure of sensitive information. The impact is particularly critical for sectors handling confidential documents, such as legal, financial, healthcare, and government institutions. While the vulnerability does not directly affect availability, the compromise of administrative accounts or data integrity could disrupt business operations and damage trust. The requirement for high privileges limits exploitation to insiders or attackers who have already breached initial defenses, but the stored XSS could facilitate lateral movement or persistent access. Given the lack of known exploits, the immediate risk is moderate, but the potential for targeted attacks against high-value European organizations exists, especially those with lax privilege management or outdated plugin versions.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the wpchill Filr – Secure document library plugin and verify the version in use. Since no official patch is currently linked, administrators should implement strict file upload restrictions at the web server or application firewall level to block HTML and other executable file types from being uploaded via the plugin interface. Enforce the principle of least privilege by limiting Administrator-level access to trusted personnel only and regularly reviewing user permissions, especially those with rights to create or edit 'filr' post types. Employ Content Security Policy (CSP) headers to mitigate the impact of potential XSS by restricting script execution sources. Monitor logs for unusual upload activity or access patterns to detect exploitation attempts early. Consider temporarily disabling the plugin or restricting its use until a vendor patch is released. Additionally, educate administrators about the risks of uploading untrusted files and implement multi-factor authentication to reduce the risk of credential compromise. Regular backups and incident response plans should be updated to include scenarios involving stored XSS attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-12T22:06:42.902Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696af5b4b22c7ad8685027b7

Added to database: 1/17/2026, 2:36:36 AM

Last enriched: 1/17/2026, 2:51:12 AM

Last updated: 1/17/2026, 4:01:10 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats