Skip to main content

CVE-2025-49973: CWE-862 Missing Authorization in GrandPlugins Image Sizes Controller, Create Custom Image Sizes, Disable Image Sizes

Medium
VulnerabilityCVE-2025-49973cvecve-2025-49973cwe-862
Published: Fri Jun 20 2025 (06/20/2025, 15:04:17 UTC)
Source: CVE Database V5
Vendor/Project: GrandPlugins
Product: Image Sizes Controller, Create Custom Image Sizes, Disable Image Sizes

Description

Missing Authorization vulnerability in GrandPlugins Image Sizes Controller, Create Custom Image Sizes, Disable Image Sizes allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Image Sizes Controller, Create Custom Image Sizes, Disable Image Sizes: from n/a through 1.0.9.

AI-Powered Analysis

AILast updated: 06/21/2025, 12:21:50 UTC

Technical Analysis

CVE-2025-49973 is a Missing Authorization vulnerability (CWE-862) affecting the GrandPlugins product suite, specifically the Image Sizes Controller, Create Custom Image Sizes, and Disable Image Sizes components. This vulnerability arises due to improperly configured access control mechanisms, allowing users with limited privileges to perform actions that should be restricted. The affected versions include all versions up to 1.0.9, with no specific version exclusions noted. The flaw permits exploitation by authenticated users with low privileges (PR:L) without requiring any user interaction (UI:N), and can be exploited remotely over the network (AV:N). The vulnerability does not impact confidentiality or availability but allows unauthorized modification of image size configurations, thus impacting integrity. The CVSS v3.1 base score is 4.3 (medium severity), reflecting the limited scope and impact. The vulnerability could enable an attacker to create or disable custom image sizes without proper authorization, potentially leading to unauthorized changes in website content presentation or functionality. While no known exploits are currently in the wild, the issue is publicly disclosed and should be addressed promptly to prevent misuse. The lack of patches at the time of publication indicates that mitigation may require manual configuration changes or vendor updates once available.

Potential Impact

For European organizations, especially those operating websites or content management systems that utilize GrandPlugins Image Sizes Controller, this vulnerability could lead to unauthorized manipulation of image size settings. This may result in degraded user experience, broken layouts, or potential exposure of sensitive visual content if image sizes are misconfigured to reveal unintended data. Although the vulnerability does not directly compromise data confidentiality or availability, the integrity impact could facilitate further attacks, such as UI manipulation or social engineering through altered site appearance. Organizations in sectors relying heavily on web presence—such as e-commerce, media, and public services—may face reputational damage or operational disruptions. The medium severity rating suggests a moderate risk, but the ease of exploitation by low-privileged authenticated users increases the likelihood of exploitation in environments with weak internal access controls or compromised user accounts.

Mitigation Recommendations

1. Implement strict role-based access controls (RBAC) to ensure only trusted administrators can access and modify image size settings within GrandPlugins components. 2. Monitor and audit user activities related to image size configurations to detect unauthorized changes promptly. 3. Restrict plugin access to trusted networks or VPNs to reduce exposure to unauthorized users. 4. Apply the principle of least privilege by reviewing and minimizing user permissions regularly. 5. Stay informed on vendor updates and apply patches or security fixes as soon as they become available. 6. If patches are not yet available, consider disabling or restricting the affected plugin features temporarily to prevent exploitation. 7. Conduct penetration testing focused on access control weaknesses in web management interfaces to identify similar authorization issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-06-11T16:07:41.545Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68568e83aded773421b5a991

Added to database: 6/21/2025, 10:50:43 AM

Last enriched: 6/21/2025, 12:21:50 PM

Last updated: 8/3/2025, 6:34:16 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats