Skip to main content

CVE-2025-4431: CWE-284 Improper Access Control in krasenslavov Featured Image Plus – Quick & Bulk Edit with Unsplash

Medium
VulnerabilityCVE-2025-4431cvecve-2025-4431cwe-284
Published: Fri May 30 2025 (05/30/2025, 07:23:40 UTC)
Source: CVE Database V5
Vendor/Project: krasenslavov
Product: Featured Image Plus – Quick & Bulk Edit with Unsplash

Description

The Featured Image Plus – Quick & Bulk Edit with Unsplash plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fip_save_attach_featured function in all versions up to, and including, 1.6.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update featured image of any post.

AI-Powered Analysis

AILast updated: 07/07/2025, 20:56:49 UTC

Technical Analysis

CVE-2025-4431 is a medium-severity vulnerability affecting the WordPress plugin 'Featured Image Plus – Quick & Bulk Edit with Unsplash' developed by krasenslavov. The vulnerability arises from improper access control (CWE-284) due to a missing capability check in the function fip_save_attach_featured. This flaw allows authenticated users with Subscriber-level privileges or higher to modify the featured image of any post on the affected WordPress site. Since the plugin versions up to and including 1.6.3 are affected, all installations using these versions are vulnerable. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (remote). The CVSS v3.1 score is 4.3 (medium), reflecting limited impact on confidentiality and availability but a clear impact on integrity, as unauthorized modification of post content is possible. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could be leveraged by low-privileged authenticated users to manipulate site content, potentially undermining content integrity, misleading site visitors, or facilitating further attacks such as phishing or misinformation campaigns. This vulnerability is particularly relevant for WordPress sites that use this plugin for managing featured images, especially those that allow Subscriber-level accounts or higher to authenticate, such as membership sites, blogs with user contributions, or multi-author platforms.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of web content hosted on WordPress sites using the affected plugin. Unauthorized modification of featured images can damage brand reputation, mislead customers, or be used as a vector for social engineering attacks. Organizations in sectors such as media, e-commerce, education, and government that rely on WordPress for content management and allow user registrations at Subscriber level or above are at risk. While the vulnerability does not directly impact confidentiality or availability, the ability to alter visual content without proper authorization can facilitate misinformation, reduce user trust, and potentially lead to compliance issues under regulations like GDPR if manipulated content results in misinformation or harms user data integrity. The absence of known exploits reduces immediate risk, but the ease of exploitation by low-privileged users means that attackers could develop exploits rapidly once the vulnerability is publicly known.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if the 'Featured Image Plus – Quick & Bulk Edit with Unsplash' plugin is installed and determine the version in use. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict Subscriber-level or higher user registrations and review user roles to minimize the number of users with authenticated access. 2) Implement strict access controls and monitoring on WordPress user accounts, especially those with editing capabilities. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the fip_save_attach_featured function or unusual featured image modifications. 4) Monitor logs for unauthorized changes to featured images and set up alerts for anomalous activity. 5) If feasible, temporarily disable or remove the plugin until a security update is available. 6) Educate site administrators and content managers about the vulnerability and encourage vigilance for unexpected content changes. 7) Follow vendor communications closely for patch releases and apply updates promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-08T12:38:03.594Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68395e2e182aa0cae2a45842

Added to database: 5/30/2025, 7:28:46 AM

Last enriched: 7/7/2025, 8:56:49 PM

Last updated: 7/30/2025, 4:11:05 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats