The Featured Image via URL plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation function in all versions u...
Description
The Featured Image via URL plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation function in all versions up to, and including, 0
Executive Summary:
A high-severity vulnerability, identified as CVE-2025-12139 with a CVSS score of 7.5, has been discovered in the "File Manager for Google Drive" WordPress plugin. This flaw could allow an unauthenticated attacker to access sensitive information from the affected website or its connected Google Drive account, potentially leading to a significant data breach. Organizations using this plugin are urged to apply security updates immediately to mitigate the risk of data exposure.
Vulnerability Details
CVE-ID: CVE-2025-12139
Affected Software: File Manager for Google Drive – Integrate Google Drive with WordPress plugin
Affected Versions: All versions up to, and including, 1.0
Vulnerability: The vulnerability is a sensitive information exposure flaw within the WordPress plugin. An unauthenticated attacker can exploit this by sending a specially crafted request to a vulnerable endpoint exposed by the plugin. This could potentially leak sensitive configuration data, API keys, authentication tokens, or file/folder information from the integrated Google Drive account without requiring any privileges on the WordPress site.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to a significant data breach, exposing confidential company documents, customer data, intellectual property, or other sensitive files stored in the connected Google Drive. The potential consequences include severe reputational damage, loss of customer trust, and potential regulatory fines for non-compliance with data protection standards (e.g., GDPR, CCPA). Unauthorized access to API keys could also allow an attacker to pivot and gain further access to connected cloud services.
Remediation Plan
Immediate Action: Identify all WordPress instances running the "File Manager for Google Drive" plugin and apply the vendor-provided security update immediately. After patching, it is critical to review web server and Google Drive API access logs for any signs of unauthorized access or exploitation attempts that may have occurred prior to remediation.
Proactive Monitoring: Monitor web server access logs for unusual or direct HTTP requests to the plugin's directories (e.g.,
/wp-content/plugins/file-manager-for-google-drive/). Scrutinize Google Cloud Platform audit logs for anomalous API activity related to the service account used by the plugin, such as unexpected file downloads, permission changes, or access from unfamiliar IP addresses.Compensating Controls: If immediate patching is not feasible, consider temporarily disabling the plugin to remove the attack surface. Alternatively, implement a Web Application Firewall (WAF) rule to block requests targeting the specific vulnerable endpoints associated with the plugin once they are publicly known.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of November 5, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. However, due to the high CVSS score and the straightforward nature of information exposure flaws, security researchers and threat actors are likely to develop exploits quickly.
Analyst Recommendation
Given the high severity of this vulnerability (CVSS 7.5) and the direct risk it poses to sensitive corporate data, we strongly recommend that organizations treat this as a high-priority issue. The primary course of action is to immediately identify all instances of the affected plugin and apply the necessary security patch. Although this CVE is not currently on the CISA KEV list, its high score makes it a likely candidate for future inclusion and a target for opportunistic attackers. Proactive patching is the most effective defense against potential exploitation and data compromise.