Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9218: CWE-862 Missing Authorization in rtcamp rtMedia for WordPress, BuddyPress and bbPress

0
Low
VulnerabilityCVE-2025-9218cvecve-2025-9218cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:26 UTC)
Source: CVE Database V5
Vendor/Project: rtcamp
Product: rtMedia for WordPress, BuddyPress and bbPress

Description

The rtMedia for WordPress, BuddyPress and bbPress plugin for WordPress is vulnerable to to Information Disclosure due to missing authorization in the handle_rest_pre_dispatch() function when the Godam plugin is active, in versions 4.7.0 to 4.7.3. This makes it possible for unauthenticated attackers to retrieve media items associated with draft or private posts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:47:46 UTC

Technical Analysis

CVE-2025-9218 identifies a missing authorization vulnerability (CWE-862) in the rtMedia plugin versions 4.7.0 through 4.7.3, which integrates with WordPress, BuddyPress, and bbPress platforms. The vulnerability specifically exists in the handle_rest_pre_dispatch() function, which fails to properly verify user permissions when the Godam plugin is active. This flaw allows unauthenticated attackers to perform REST API calls that retrieve media items associated with draft or private posts—content normally restricted to authorized users. Because the vulnerability bypasses authorization checks, attackers can access sensitive media data without authentication or user interaction. The attack vector is network-based, but the complexity is high due to the prerequisite of the Godam plugin being active and specific plugin versions being used. The vulnerability affects confidentiality only, with no impact on data integrity or system availability. No public exploits have been reported, and no official patches are linked yet. The CVSS v3.1 base score is 3.7, indicating a low severity primarily due to limited impact and exploitation complexity. This vulnerability is particularly relevant for websites that store sensitive or private media content in draft or unpublished posts, as unauthorized disclosure could lead to privacy breaches or information leakage.

Potential Impact

The primary impact of CVE-2025-9218 is unauthorized disclosure of media content associated with draft or private posts, which can compromise confidentiality. Organizations hosting sensitive unpublished media—such as internal documents, proprietary images, or private user-generated content—may face privacy violations or reputational damage if this data is exposed. Although the vulnerability does not affect data integrity or availability, the leakage of private media could facilitate further social engineering, phishing, or targeted attacks. The requirement for the Godam plugin to be active and the specific plugin versions limits the scope, but many WordPress sites use rtMedia and related plugins, increasing the potential attack surface globally. Since no authentication or user interaction is required, attackers can remotely exploit this vulnerability over the network, though the high attack complexity reduces the likelihood of widespread exploitation. Organizations with public-facing WordPress sites using these plugins should be aware of the risk to their unpublished content and consider the potential legal and compliance implications of unauthorized data disclosure.

Mitigation Recommendations

To mitigate CVE-2025-9218, organizations should first verify if the Godam plugin is active alongside rtMedia versions 4.7.0 to 4.7.3. If so, immediate steps include disabling the Godam plugin or the rtMedia plugin until a patch is available. Monitor vendor announcements for official security updates and apply patches promptly once released. In the interim, restrict REST API access using web application firewalls (WAFs) or server-level access controls to limit unauthenticated requests to the affected endpoints. Implement strict access controls on draft and private post media directories to prevent direct URL access. Conduct audits of media content stored in draft or private posts to identify sensitive data that could be exposed. Additionally, consider deploying intrusion detection systems (IDS) to monitor unusual REST API activity. Educate site administrators about the risk and encourage regular plugin updates and minimal plugin usage to reduce attack surface. Finally, review and harden WordPress REST API permissions and authentication mechanisms to prevent similar authorization bypass issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-08-19T23:21:42.590Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef67d977419e584a5279

Added to database: 12/13/2025, 4:45:27 AM

Last enriched: 2/26/2026, 5:47:46 PM

Last updated: 3/24/2026, 10:04:56 AM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses