Cyber Posture

CVE-2025-12153

High

Published: 05 December 2025

Published
05 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0022 44.4th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-12153 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Wordpress (inferred from references). Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 44.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires identification, reporting, and correction of the arbitrary file upload flaw due to missing validation in the plugin, preventing exploitation.

prevent

Mandates validation of information inputs such as uploaded files to ensure only permitted types are accepted, directly addressing the missing file type validation.

preventdetect

Deploys malicious code protection at entry points to scan and eradicate dangerous files uploaded via the vulnerability, mitigating potential RCE.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Arbitrary file upload in public-facing WordPress plugin enables exploitation of public-facing application (T1190) for remote code execution, facilitating privilege escalation from low-privileged authenticated access (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The Featured Image via URL plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation function in all versions up to, and including, 0.1. This makes it possible for authenticated attackers, with Contributor-level access and…

more

above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Deeper analysisAI

CVE-2025-12153 is an arbitrary file upload vulnerability in the Featured Image via URL plugin for WordPress, affecting all versions up to and including 0.1. The flaw arises from a missing file type validation function, allowing improper handling of uploaded files.

Authenticated attackers with Contributor-level access or higher can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation enables uploading arbitrary files to the affected site's server, which may lead to remote code execution. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type).

Mitigation details are available in advisories from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/9687a88f-ac5b-4746-a68c-91c358b5fb87?source=cve and the plugin's page on WordPress.org at https://wordpress.org/plugins/featured-image-via-url/.

Details

CWE(s)

Affected Products

Wordpress
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-13066Shared CWE-434
CVE-2025-20354Shared CWE-434
CVE-2025-60947Shared CWE-434
CVE-2025-34329Shared CWE-434
CVE-2025-63601Shared CWE-434
CVE-2025-13536Shared CWE-434
CVE-2025-11755Shared CWE-434
CVE-2026-20098Shared CWE-434
CVE-2026-25201Shared CWE-434
CVE-2025-12968Shared CWE-434

References