CVE-2025-12138

WordPress · WordPress URL Image Importer plugin

A high-severity vulnerability has been identified in the URL Image Importer plugin for WordPress, which could allow an unauthenticated attacker to take complete control of an affected website.

Executive summary

A high-severity vulnerability has been identified in the URL Image Importer plugin for WordPress, which could allow an unauthenticated attacker to take complete control of an affected website. The flaw stems from the plugin's failure to properly validate file types, enabling an attacker to upload and execute malicious code. Successful exploitation could lead to website defacement, data theft, or the use of the server for further malicious activities.

Vulnerability

The vulnerability is an Arbitrary File Upload within the URL Image Importer plugin. The plugin is designed to import images from external URLs, but it lacks sufficient validation to ensure that the provided URL points to an actual image file. An attacker can exploit this by providing a URL to a malicious script (e.g., a PHP web shell). The plugin will download this script and save it to a web-accessible directory on the server, treating it as a standard upload. The attacker can then access the uploaded file via their browser to execute the code, granting them remote code execution capabilities on the server hosting the WordPress site.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit could result in a complete compromise of the affected website and the underlying server. Potential consequences include the theft of sensitive data such as customer information and user credentials, website defacement causing significant reputational damage, and financial loss. Furthermore, a compromised server could be used as a pivot point to attack other internal systems or be leveraged in wider malicious campaigns like hosting malware or participating in botnets, creating further legal and financial liabilities for the organization.

Remediation

Immediate Action: Update the vulnerable "URL Image Importer" plugin to the latest available version, which contains a patch for this vulnerability. If the plugin is not critical for business operations, the recommended course of action is to deactivate and delete it entirely to remove the attack vector. After taking action, review WordPress security settings to ensure no unauthorized changes have been made.

Proactive Monitoring: Monitor web server access logs for suspicious POST requests to the plugin's endpoints, particularly those involving non-image file extensions (e.g., .php, .phtml, .php5). Implement file integrity monitoring on the WordPress wp-content/uploads directory to detect the creation of unexpected or executable files. Monitor for unusual outbound network traffic from the web server, which could indicate a successful web shell compromise.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules to block file uploads containing executable extensions. Harden server permissions to prevent script execution in the uploads directory. The most effective compensating control short of patching is to disable the vulnerable plugin until it can be safely updated.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the high CVSS score of 8.8 and the public availability of exploit code, this vulnerability poses a critical risk and should be remediated immediately. The potential for complete system compromise necessitates urgent action. We strongly recommend that organizations identify all instances of the "URL Image Importer" plugin and apply the vendor-supplied update without delay. If the plugin cannot be updated, it must be disabled and removed to mitigate the risk.