CVE-2025-12019

4.4 MEDIUM

📋 TL;DR

The Featured Image WordPress plugin has a stored cross-site scripting vulnerability in versions up to 2.1. Authenticated attackers with administrator privileges can inject malicious scripts via image metadata, which execute when users view affected pages. This only impacts WordPress multi-site installations or sites where unfiltered_html capability is disabled.

💻 Affected Systems

Products:
  • WordPress Featured Image plugin
Versions: All versions up to and including 2.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ✅ No
Notes: Only affects WordPress multi-site installations OR single-site installations where unfiltered_html capability is disabled for administrators.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leading to full site takeover, data theft, or malware distribution to visitors.

🟠

Likely Case

Privileged attacker defaces website, steals session cookies, or redirects users to malicious sites.

🟢

If Mitigated

Limited impact due to requiring admin privileges and specific WordPress configurations.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator-level WordPress credentials and specific WordPress configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2 or later

Vendor Advisory: https://wordpress.org/plugins/featured-image/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Featured Image plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin, then install fresh version 2.2+ from WordPress repository.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily deactivate Featured Image plugin until patched version is available

wp plugin deactivate featured-image

Enable unfiltered_html for admins

all

For single-site installations only: Enable unfiltered_html capability for administrator roles

add_filter('user_has_cap', function($allcaps) { $allcaps['unfiltered_html'] = true; return $allcaps; });

🧯 If You Can't Patch

  • Remove administrator access from untrusted users
  • Implement web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Featured Image plugin version ≤2.1

Check Version:

wp plugin get featured-image --field=version

Verify Fix Applied:

Verify Featured Image plugin version is 2.2 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual image metadata updates by admin users
  • JavaScript payloads in image alt/text fields

Network Indicators:

  • Suspicious script tags in HTTP responses containing image metadata

SIEM Query:

source="wordpress.log" AND "featured-image" AND ("update" OR "edit") AND ("script" OR "javascript" OR "onload" OR "onerror")

🔗 References

📤 Share & Export