CVE-2025-4370: CWE-862 Missing Authorization in themefusecom Brizy – Page Builder
The Brizy – Page Builder plugin for WordPress is vulnerable to limited file uploads due to missing authorization on process_external_asset_urls function as well as missing path validation in store_file function in all versions up to, and including, 2.6.20. This makes it possible for unauthenticated attackers to upload .TXT files on the affected site's server.
AI Analysis
Technical Summary
CVE-2025-4370 is a vulnerability identified in the Brizy – Page Builder plugin for WordPress, developed by themefusecom. The issue arises from missing authorization checks in the process_external_asset_urls function and inadequate path validation in the store_file function across all versions up to and including 2.6.20. This flaw allows unauthenticated attackers to upload limited file types, specifically .TXT files, to the server hosting the vulnerable WordPress site. The absence of authorization means that attackers do not need any credentials or user interaction to exploit this vulnerability remotely over the network. The lack of path validation further facilitates the upload of files to arbitrary locations within the server's accessible directories. While the uploaded files are restricted to .TXT format, this can still be exploited for information disclosure, such as uploading files containing malicious payloads disguised as text or for reconnaissance purposes. The vulnerability is categorized under CWE-862 (Missing Authorization), indicating a failure to enforce proper access controls. The CVSS v3.1 base score of 5.3 reflects a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), limited integrity impact (I:L), and no availability impact (A:N). No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. However, the vulnerability poses a risk to WordPress sites using this plugin, especially those exposed to the internet without additional security controls.
Potential Impact
The primary impact of CVE-2025-4370 is the unauthorized upload of .TXT files to the server hosting the vulnerable WordPress site. Although the uploaded files are limited to text format, attackers can leverage this capability for information disclosure, such as uploading files containing sensitive data or configuration details if combined with other vulnerabilities. Additionally, attackers might use this upload vector as a foothold for further attacks, including social engineering or chaining with other vulnerabilities to achieve remote code execution or privilege escalation. The integrity of the affected system is partially compromised due to unauthorized file uploads, but confidentiality and availability impacts are minimal. Organizations running websites with the Brizy – Page Builder plugin are at risk of defacement, data leakage, or indirect compromise. The vulnerability is exploitable remotely without authentication or user interaction, increasing the attack surface. However, the lack of direct execution capability of uploaded files limits the severity compared to more critical file upload vulnerabilities. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation. Overall, the vulnerability could lead to reputational damage, loss of trust, and potential compliance issues for affected organizations.
Mitigation Recommendations
To mitigate CVE-2025-4370, organizations should first verify if they are using the Brizy – Page Builder plugin and identify the version installed. Immediate mitigation includes restricting public access to the plugin’s upload endpoints via web application firewalls (WAFs) or server-level access controls to prevent unauthenticated requests. Implement strict input validation and path sanitization at the server level to block unauthorized file uploads and directory traversal attempts. Monitor web server logs for suspicious upload activity, especially POST requests targeting plugin-related URLs. If possible, disable or remove the plugin until a vendor patch is released. Employ security plugins that enforce authorization checks on file uploads and restrict file types beyond the plugin’s default behavior. Regularly update WordPress core and all plugins to the latest versions once a patch addressing this vulnerability is available. Additionally, conduct periodic security audits and penetration testing focused on file upload functionalities. Educate site administrators about the risks of unauthorized file uploads and encourage the use of least privilege principles for user roles managing the website.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-4370: CWE-862 Missing Authorization in themefusecom Brizy – Page Builder
Description
The Brizy – Page Builder plugin for WordPress is vulnerable to limited file uploads due to missing authorization on process_external_asset_urls function as well as missing path validation in store_file function in all versions up to, and including, 2.6.20. This makes it possible for unauthenticated attackers to upload .TXT files on the affected site's server.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-4370 is a vulnerability identified in the Brizy – Page Builder plugin for WordPress, developed by themefusecom. The issue arises from missing authorization checks in the process_external_asset_urls function and inadequate path validation in the store_file function across all versions up to and including 2.6.20. This flaw allows unauthenticated attackers to upload limited file types, specifically .TXT files, to the server hosting the vulnerable WordPress site. The absence of authorization means that attackers do not need any credentials or user interaction to exploit this vulnerability remotely over the network. The lack of path validation further facilitates the upload of files to arbitrary locations within the server's accessible directories. While the uploaded files are restricted to .TXT format, this can still be exploited for information disclosure, such as uploading files containing malicious payloads disguised as text or for reconnaissance purposes. The vulnerability is categorized under CWE-862 (Missing Authorization), indicating a failure to enforce proper access controls. The CVSS v3.1 base score of 5.3 reflects a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), limited integrity impact (I:L), and no availability impact (A:N). No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. However, the vulnerability poses a risk to WordPress sites using this plugin, especially those exposed to the internet without additional security controls.
Potential Impact
The primary impact of CVE-2025-4370 is the unauthorized upload of .TXT files to the server hosting the vulnerable WordPress site. Although the uploaded files are limited to text format, attackers can leverage this capability for information disclosure, such as uploading files containing sensitive data or configuration details if combined with other vulnerabilities. Additionally, attackers might use this upload vector as a foothold for further attacks, including social engineering or chaining with other vulnerabilities to achieve remote code execution or privilege escalation. The integrity of the affected system is partially compromised due to unauthorized file uploads, but confidentiality and availability impacts are minimal. Organizations running websites with the Brizy – Page Builder plugin are at risk of defacement, data leakage, or indirect compromise. The vulnerability is exploitable remotely without authentication or user interaction, increasing the attack surface. However, the lack of direct execution capability of uploaded files limits the severity compared to more critical file upload vulnerabilities. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future exploitation. Overall, the vulnerability could lead to reputational damage, loss of trust, and potential compliance issues for affected organizations.
Mitigation Recommendations
To mitigate CVE-2025-4370, organizations should first verify if they are using the Brizy – Page Builder plugin and identify the version installed. Immediate mitigation includes restricting public access to the plugin’s upload endpoints via web application firewalls (WAFs) or server-level access controls to prevent unauthenticated requests. Implement strict input validation and path sanitization at the server level to block unauthorized file uploads and directory traversal attempts. Monitor web server logs for suspicious upload activity, especially POST requests targeting plugin-related URLs. If possible, disable or remove the plugin until a vendor patch is released. Employ security plugins that enforce authorization checks on file uploads and restrict file types beyond the plugin’s default behavior. Regularly update WordPress core and all plugins to the latest versions once a patch addressing this vulnerability is available. Additionally, conduct periodic security audits and penetration testing focused on file upload functionalities. Educate site administrators about the risks of unauthorized file uploads and encourage the use of least privilege principles for user roles managing the website.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-05T19:49:56.278Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68884ee8ad5a09ad008b0616
Added to database: 7/29/2025, 4:32:40 AM
Last enriched: 2/27/2026, 2:27:44 PM
Last updated: 3/25/2026, 5:45:34 AM
Views: 109
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.