Cyber Posture

CVE-2025-12153

High

Published: 05 December 2025

Published
05 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 39.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

The Featured Image via URL plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation function in all versions up to, and including, 0.1. This makes it possible for authenticated attackers, with Contributor-level access and…

more

above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires identification, reporting, and correction of the arbitrary file upload flaw due to missing validation in the plugin, preventing exploitation.

prevent

Mandates validation of information inputs such as uploaded files to ensure only permitted types are accepted, directly addressing the missing file type validation.

preventdetect

Deploys malicious code protection at entry points to scan and eradicate dangerous files uploaded via the vulnerability, mitigating potential RCE.

Security SummaryAI

CVE-2025-12153 is an arbitrary file upload vulnerability in the Featured Image via URL plugin for WordPress, affecting all versions up to and including 0.1. The flaw arises from a missing file type validation function, allowing improper handling of uploaded files.

Authenticated attackers with Contributor-level access or higher can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables uploading arbitrary files to the affected site's server, which may lead to remote code execution. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type).

Mitigation details are available in advisories from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/9687a88f-ac5b-4746-a68c-91c358b5fb87?source=cve and the plugin's page on WordPress.org at https://wordpress.org/plugins/featured-image-via-url/.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Arbitrary file upload in public-facing WordPress plugin enables exploitation of public-facing application (T1190) for remote code execution, facilitating privilege escalation from low-privileged authenticated access (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References