Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14913: CWE-862 Missing Authorization in wpshuffle Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin

0
Medium
VulnerabilityCVE-2025-14913cvecve-2025-14913cwe-862
Published: Thu Dec 25 2025 (12/25/2025, 23:20:02 UTC)
Source: CVE Database V5
Vendor/Project: wpshuffle
Product: Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin

Description

The Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin plugin for WordPress is vulnerable to unauthorized loss of data due to an incorrect authorization check on the 'media_delete_action' function in all versions up to, and including, 1.2.6. This makes it possible for unauthenticated attackers to delete arbitrary attachments.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:44:12 UTC

Technical Analysis

CVE-2025-14913 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin developed by wpshuffle. This plugin, widely used to facilitate frontend post submissions on WordPress sites, contains an authorization flaw in its 'media_delete_action' function across all versions up to and including 1.2.6. The vulnerability arises because the function does not properly verify whether the requester has the necessary permissions to delete media attachments. Consequently, an unauthenticated attacker can invoke this function remotely to delete arbitrary media files attached to posts or pages. The vulnerability does not require any user privileges or interaction, making it remotely exploitable over the network with low complexity. The impact primarily affects the integrity of data by enabling unauthorized deletion of media content; however, it does not compromise confidentiality or availability directly. The CVSS 3.1 score of 5.3 reflects a medium severity level, considering the ease of exploitation but limited scope of damage. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability poses a risk to websites relying on this plugin for frontend posting capabilities, potentially leading to content disruption and loss of media assets.

Potential Impact

The primary impact of CVE-2025-14913 is unauthorized data loss through deletion of media attachments on affected WordPress sites. This can disrupt website content presentation, damage brand reputation, and cause operational issues for organizations relying on media-rich posts. Since the exploit requires no authentication or user interaction, attackers can automate deletion attacks at scale, potentially targeting multiple sites. Although the vulnerability does not affect confidentiality or availability directly, the integrity loss can lead to significant content management challenges and increased recovery costs. Organizations with public-facing WordPress sites using this plugin are at risk of content tampering and may face downtime or user dissatisfaction. The absence of known exploits reduces immediate threat but does not eliminate the risk, especially as exploit code could be developed rapidly given the low complexity. The vulnerability could also be leveraged as part of a broader attack chain to weaken site defenses or distract administrators.

Mitigation Recommendations

1. Immediately verify if the Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin is installed and identify the version in use. 2. If a patched version becomes available, apply the update promptly to ensure the authorization check is enforced. 3. In the absence of an official patch, implement web application firewall (WAF) rules to block unauthorized requests to the 'media_delete_action' endpoint, restricting access to trusted users or IP addresses. 4. Restrict or disable frontend media deletion capabilities if not essential to site functionality. 5. Monitor server and application logs for unusual or repeated requests targeting media deletion functions to detect potential exploitation attempts. 6. Employ principle of least privilege by limiting plugin permissions and user roles that can perform media deletions. 7. Regularly back up media files and site content to enable rapid restoration in case of unauthorized deletions. 8. Educate site administrators about the vulnerability and encourage vigilance for suspicious activity. 9. Consider isolating or sandboxing the plugin functionality to minimize impact if exploited. 10. Engage with the plugin vendor or community to track patch releases and security advisories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-18T19:29:05.828Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694dc7eb8e70994989c72dbf

Added to database: 12/25/2025, 11:25:31 PM

Last enriched: 2/27/2026, 11:44:12 AM

Last updated: 3/25/2026, 1:21:21 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses