WordPress Upload.am – Contributor+ Arbitrary Option Disclosure (CVE-2025-12630)
Author: Beatriz Fresno Naumova (beafn28)
Date: 29/09/2025
Vendor: Upload.am
Product: Upload.am File Hosting VPN (WordPress Plugin)
Versions affected: < 1.0.1
Component: AJAX request handler – option retrieval
CWE: CWE-862 – Missing Authorization
OWASP: A5 – Broken Access Control
Attack type: Remote
Impact: Information Disclosure
Description
The Upload.am File Hosting VPN WordPress plugin versions prior to 1.0.1 contain a missing authorization vulnerability in an AJAX request handler. The affected endpoint does not perform a proper capability check, allowing authenticated users with low privileges (such as Contributor) to retrieve arbitrary WordPress site options.
This lack of authorization enforcement enables unauthorized access to sensitive configuration values that should be restricted to administrative roles.
Impact
Primary impact: Information disclosure of WordPress site options.
Consequences:
Exposure of sensitive configuration data
Facilitation of further attacks through reconnaissance
Increased risk of privilege escalation or targeted exploitation
Attack Details
Attack Vector (AV): Network (N)
Attack Complexity (AC): Low (L)
Privileges Required (PR): Low (L)
User Interaction (UI): None (N)
Scope (S): Unchanged (U)
Confidentiality (C): Low (L)
Integrity (I): None (N)
Availability (A): None (N)
CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v3.1 Base Score: 4.9 (Medium)
POC
Mitigation
Enforce capability checks: Validate user permissions using
current_user_can()in all AJAX handlers.Least privilege enforcement: Prevent contributor-level users from accessing site-wide configuration options.
Proper error handling: Return
403 Forbiddenresponses for unauthorized access attempts.Security testing: Add regression tests to ensure authorization checks are enforced on all endpoints.
Code audit: Review similar AJAX handlers for repeated authorization flaws.
Discoverer
Beatriz Fresno Naumova (beafn28)
References
Last updated
Was this helpful?