WordPress Upload.am – Contributor+ Arbitrary Option Disclosure (CVE-2025-12630)

Author: Beatriz Fresno Naumova (beafn28)

Date: 29/09/2025

Vendor: Upload.am

Product: Upload.am File Hosting VPN (WordPress Plugin)

Versions affected: < 1.0.1

Component: AJAX request handler – option retrieval

CWE: CWE-862 – Missing Authorization

OWASP: A5 – Broken Access Control

Attack type: Remote

Impact: Information Disclosure

Description

The Upload.am File Hosting VPN WordPress plugin versions prior to 1.0.1 contain a missing authorization vulnerability in an AJAX request handler. The affected endpoint does not perform a proper capability check, allowing authenticated users with low privileges (such as Contributor) to retrieve arbitrary WordPress site options.

This lack of authorization enforcement enables unauthorized access to sensitive configuration values that should be restricted to administrative roles.

Impact

Primary impact: Information disclosure of WordPress site options.

Consequences:

  • Exposure of sensitive configuration data

  • Facilitation of further attacks through reconnaissance

  • Increased risk of privilege escalation or targeted exploitation

Attack Details

  • Attack Vector (AV): Network (N)

  • Attack Complexity (AC): Low (L)

  • Privileges Required (PR): Low (L)

  • User Interaction (UI): None (N)

  • Scope (S): Unchanged (U)

  • Confidentiality (C): Low (L)

  • Integrity (I): None (N)

  • Availability (A): None (N)

CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v3.1 Base Score: 4.9 (Medium)

POC

Mitigation

  • Enforce capability checks: Validate user permissions using current_user_can() in all AJAX handlers.

  • Least privilege enforcement: Prevent contributor-level users from accessing site-wide configuration options.

  • Proper error handling: Return 403 Forbidden responses for unauthorized access attempts.

  • Security testing: Add regression tests to ensure authorization checks are enforced on all endpoints.

  • Code audit: Review similar AJAX handlers for repeated authorization flaws.

Discoverer

Beatriz Fresno Naumova (beafn28)

References

Last updated

Was this helpful?