CVE-2025-12153
Published: 05 December 2025
Description
The Featured Image via URL plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation function in all versions up to, and including, 0.1. This makes it possible for authenticated attackers, with Contributor-level access and…
more
above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Mitigating Controls (NIST 800-53 r5)AI
Requires identification, reporting, and correction of the arbitrary file upload flaw due to missing validation in the plugin, preventing exploitation.
Mandates validation of information inputs such as uploaded files to ensure only permitted types are accepted, directly addressing the missing file type validation.
Deploys malicious code protection at entry points to scan and eradicate dangerous files uploaded via the vulnerability, mitigating potential RCE.
Security SummaryAI
CVE-2025-12153 is an arbitrary file upload vulnerability in the Featured Image via URL plugin for WordPress, affecting all versions up to and including 0.1. The flaw arises from a missing file type validation function, allowing improper handling of uploaded files.
Authenticated attackers with Contributor-level access or higher can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables uploading arbitrary files to the affected site's server, which may lead to remote code execution. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type).
Mitigation details are available in advisories from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/9687a88f-ac5b-4746-a68c-91c358b5fb87?source=cve and the plugin's page on WordPress.org at https://wordpress.org/plugins/featured-image-via-url/.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file upload in public-facing WordPress plugin enables exploitation of public-facing application (T1190) for remote code execution, facilitating privilege escalation from low-privileged authenticated access (T1068).