CVE-2025-12153

WordPress · WordPress "Featured Image via URL" plugin

A high-severity vulnerability has been identified in the "Featured Image via URL" plugin for WordPress.

Executive summary

A high-severity vulnerability has been identified in the "Featured Image via URL" plugin for WordPress. This flaw allows an unauthenticated attacker to upload malicious files, such as a web shell, to a vulnerable website. Successful exploitation could lead to a complete compromise of the website, allowing the attacker to steal data, deface the site, or use the server for further malicious activities.

Vulnerability

The vulnerability exists because the plugin's function for importing an image from a URL fails to properly validate the file type of the remote file. An attacker can provide a URL pointing to a malicious script (e.g., a PHP web shell) that has been disguised with an image file extension. The plugin will download this file and save it to a web-accessible directory on the server, treating it as a legitimate image. The attacker can then navigate to the direct URL of the uploaded file to execute the malicious script, gaining remote code execution capabilities on the server within the context of the web server user.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit could have a significant business impact, leading to a full compromise of the web server. Potential consequences include the theft of sensitive data such as customer information or intellectual property, website defacement causing reputational damage, and financial loss from downtime or recovery efforts. The compromised server could also be used as a pivot point to attack other internal network resources or be co-opted into a botnet for launching attacks against other organizations.

Remediation

Immediate Action:

  • Immediately update the "Featured Image via URL" plugin to the latest available version, which contains a patch for this vulnerability.
  • If the plugin is not critical to business operations, the recommended course of action is to deactivate and delete it to completely remove the attack surface.
  • Review WordPress security settings to ensure they follow hardening best practices, including file permissions and user roles.

Proactive Monitoring:

  • Monitor web server logs for suspicious POST requests to plugin-related endpoints or direct access attempts to non-image files (e.g., .php, .phtml) within the /wp-content/uploads/ directory.
  • Implement file integrity monitoring to alert on the creation of new, unexpected executable files in web directories.
  • Analyze network traffic for unusual outbound connections from the web server, which could indicate a successful compromise and communication with a command-and-control server.

Compensating Controls:

  • Deploy a Web Application Firewall (WAF) with rules designed to inspect file uploads and block requests containing malicious file types or patterns associated with web shells.
  • Configure the web server to prevent the execution of scripts (e.g., PHP) in the uploads directory. This can often be achieved via .htaccess rules or direct server configuration changes.
  • Restrict the web server's file system permissions to ensure the web server process only has write access to the specific directories where it is absolutely required.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high CVSS score of 8.8 and the potential for complete system compromise, this vulnerability presents a critical risk to the organization. We strongly recommend that all teams responsible for WordPress sites immediately identify instances running the vulnerable "Featured Image via URL" plugin and apply the necessary updates or remove the plugin without delay. Although this CVE is not currently on the CISA KEV list, its severity warrants treating it with the highest priority. After patching, a thorough review should be conducted to search for any indicators of compromise.