CVE-2025-12384

Document · Document Embedder – Embed PDFs, Word, Excel, and Other Files plugin for WordPress

A high-severity vulnerability has been identified in the "Document Embedder" plugin for WordPress, affecting all versions up to and including 2.0.

Executive summary

A high-severity vulnerability has been identified in the "Document Embedder" plugin for WordPress, affecting all versions up to and including 2.0. This flaw allows an unauthenticated attacker to potentially access, modify, or delete sensitive files on the web server, leading to a significant risk of data breach, website defacement, or complete loss of service. Immediate action is required to update the plugin to prevent exploitation.

Vulnerability

The vulnerability exists due to insufficient input validation and a lack of proper access controls on a function responsible for handling file operations within the plugin. An unauthenticated remote attacker can craft a malicious request containing path traversal sequences (e.g., ../../) to manipulate file paths. Successful exploitation allows the attacker to read, write, or delete arbitrary files on the server within the permissions of the web server process, potentially exposing sensitive configuration files like wp-config.php, modifying core application files, or deleting critical data.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.6. Exploitation could have severe consequences for the organization, including a complete compromise of the affected website. Specific risks include the theft of sensitive data (such as database credentials, user information, and proprietary documents), unauthorized modification of website content leading to reputational damage, and permanent data loss if an attacker deletes critical files or backups. A successful attack could result in significant downtime, financial loss, and potential regulatory penalties for data breaches.

Remediation

Immediate Action:

  • Immediately update the "Document Embedder" plugin to the latest patched version provided by the vendor.
  • If the plugin is not essential for business operations, the recommended course of action is to deactivate and completely uninstall it to eliminate the attack surface.
  • Review WordPress file and directory permissions to ensure they follow the principle of least privilege, limiting the web server's ability to write to non-essential locations.

Proactive Monitoring:

  • Monitor web server access logs for suspicious requests targeting the plugin's endpoints, specifically looking for patterns indicative of path traversal attacks (e.g., ../, %2e%2e/, or encoded variations).
  • Implement a File Integrity Monitoring (FIM) solution to detect and alert on unauthorized changes to core WordPress files, theme files, and plugin files.
  • Review audit logs for any unauthorized administrative actions or unexpected changes to user accounts.

Compensating Controls:

  • If immediate patching is not feasible, deploy a Web Application Firewall (WAF) with rules specifically designed to block path traversal and directory traversal attacks.
  • Restrict access to the WordPress administrative dashboard (/wp-admin) to trusted IP addresses only.
  • Ensure regular, automated backups of the entire WordPress installation (files and database) are being created and stored securely in an off-site location.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.6 and the critical impact of potential exploitation, we strongly recommend that organizations treat this vulnerability with high urgency. The risk of data breach, unauthorized modification, and data loss is significant. Although this CVE is not yet on the CISA KEV list, its severity and the ease of potential exploitation make it a prime target for attackers. All instances of the affected plugin should be identified and updated to the latest version or removed immediately.