CVE-2025-12161

WordPress · WordPress Smart Auto Upload Images plugin

A high-severity vulnerability has been identified in the Smart Auto Upload Images plugin for WordPress.

Executive summary

A high-severity vulnerability has been identified in the Smart Auto Upload Images plugin for WordPress. This flaw allows an attacker to upload malicious files to a website, which could lead to a complete server compromise, data theft, and website defacement. Organizations using this plugin are at significant risk and should take immediate action to mitigate this threat.

Vulnerability

The vulnerability is an Arbitrary File Upload. The plugin's auto-image creation function fails to properly validate the types of files being uploaded. An authenticated attacker with privileges to create content could exploit this by crafting a request to upload a malicious script (e.g., a PHP web shell) disguised as an image file. Because the server does not check the file's actual content or extension correctly, it saves the malicious file to a web-accessible directory, granting the attacker the ability to execute arbitrary code on the server by simply navigating to the uploaded file's URL.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could lead to a complete compromise of the affected web server. The potential business impact includes theft of sensitive data such as customer information or internal documents, website defacement causing significant reputational damage, and financial loss from business disruption. Furthermore, a compromised server could be used as a pivot point to attack other internal network resources or be leveraged to distribute malware and launch phishing attacks against customers.

Remediation

Immediate Action:

  • Identify all WordPress instances running the "Smart Auto Upload Images" plugin.
  • Update the plugin to the latest available version immediately, which contains the necessary security patch.
  • If the plugin is not essential for business operations, the recommended course of action is to deactivate and completely remove it to eliminate the attack surface.

Proactive Monitoring:

  • Monitor web server access logs for POST requests to plugin-specific endpoints, looking for uploads of files with non-image extensions (e.g., .php, .phtml, .phar).
  • Implement File Integrity Monitoring (FIM) on the web server to detect the creation of unexpected executable files within the WordPress wp-content/uploads directory.
  • Monitor for unusual outbound network traffic from the web server, which could indicate a successful compromise and communication with a command-and-control server.

Compensating Controls:

  • Implement a Web Application Firewall (WAF) with rules to inspect file uploads and block executable file types.
  • Harden web server configurations to prevent the execution of scripts (e.g., PHP) within the uploads directory. This can often be achieved via .htaccess rules for Apache or similar configurations for Nginx.
  • Enforce the principle of least privilege for WordPress user roles, ensuring that only trusted administrators can upload files.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high CVSS score of 8.8 and the critical impact of remote code execution, this vulnerability poses a significant risk to the organization. While it is not currently listed on the CISA KEV catalog and no public exploit is available, its simplicity makes it an attractive target for attackers. We strongly recommend that all affected instances of the "Smart Auto Upload Images" plugin be patched or removed immediately. If patching cannot be performed right away, the implementation of compensating controls, particularly disabling script execution in the uploads folder, should be treated as a critical priority.