Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4431: CWE-284 Improper Access Control in krasenslavov Featured Image Plus – Quick & Bulk Edit with Unsplash

0
Medium
VulnerabilityCVE-2025-4431cvecve-2025-4431cwe-284
Published: Fri May 30 2025 (05/30/2025, 07:23:40 UTC)
Source: CVE Database V5
Vendor/Project: krasenslavov
Product: Featured Image Plus – Quick & Bulk Edit with Unsplash

Description

The Featured Image Plus – Quick & Bulk Edit with Unsplash plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fip_save_attach_featured function in all versions up to, and including, 1.6.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update featured image of any post.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:32:40 UTC

Technical Analysis

The vulnerability identified as CVE-2025-4431 affects the WordPress plugin Featured Image Plus – Quick & Bulk Edit with Unsplash, developed by krasenslavov. This plugin facilitates bulk editing and quick assignment of featured images using Unsplash integration. The root cause is an improper access control issue (CWE-284) due to a missing capability check in the function fip_save_attach_featured. This function is responsible for saving or updating the featured image of posts. Because the plugin fails to verify whether the authenticated user has the appropriate permissions before modifying post metadata, any user with at least Subscriber-level privileges can exploit this flaw to change the featured image of any post on the site. The vulnerability affects all versions up to and including 1.6.3. Exploitation requires authentication but no user interaction beyond that, and it can be performed remotely over the network. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity and no impact on confidentiality or availability, but a low impact on integrity. No public exploit code or patches are currently available. This vulnerability could be leveraged to misrepresent content or manipulate site appearance, potentially undermining trust or facilitating social engineering attacks. The issue highlights the importance of enforcing strict capability checks in WordPress plugins, especially those that modify post content or metadata.

Potential Impact

The primary impact of this vulnerability is unauthorized modification of post featured images, which affects data integrity. Attackers with Subscriber-level access or higher can alter the visual representation of posts, potentially misleading site visitors or damaging the credibility of content. While this does not expose sensitive data or disrupt service availability, it can be used as a vector for misinformation, phishing, or defacement campaigns. Organizations relying on WordPress sites with this plugin installed may face reputational damage and loss of user trust if attackers exploit this flaw. The scope includes any WordPress site using the affected plugin versions, which could be significant given WordPress's widespread adoption. Since exploitation requires authentication, the risk is higher in environments with weak user management or where subscriber accounts are easily obtained or compromised. No known exploits in the wild reduce immediate risk, but the vulnerability remains a concern until patched.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit user roles and permissions to ensure that only trusted users have Subscriber-level or higher access. Restricting user registrations or implementing stricter verification can reduce the risk of unauthorized exploitation. Until an official patch is released, consider disabling or uninstalling the Featured Image Plus – Quick & Bulk Edit with Unsplash plugin if it is not essential. Alternatively, apply custom code to enforce capability checks on the fip_save_attach_featured function, ensuring only authorized roles can modify featured images. Monitoring logs for unusual changes to post metadata or featured images can help detect exploitation attempts. Keep WordPress core and all plugins updated, and subscribe to vendor or security mailing lists for timely patch releases. Employ web application firewalls (WAFs) with rules targeting unauthorized post modifications as a temporary protective measure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-08T12:38:03.594Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68395e2e182aa0cae2a45842

Added to database: 5/30/2025, 7:28:46 AM

Last enriched: 2/27/2026, 2:32:40 PM

Last updated: 3/26/2026, 10:06:27 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses