CVE-2025-12558

4.3 MEDIUM

📋 TL;DR

The Beaver Builder WordPress plugin up to version 2.9.4 contains an information disclosure vulnerability that allows authenticated users with Contributor-level access or higher to access metadata and paths of private attachments. This could enable attackers to view files that should be restricted. Only WordPress sites using vulnerable Beaver Builder versions are affected.

💻 Affected Systems

Products:
  • Beaver Builder - WordPress Page Builder
Versions: All versions up to and including 2.9.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Beaver Builder plugin and at least one user with Contributor role or higher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive private files containing confidential information, intellectual property, or personal data, leading to data breaches and regulatory violations.

🟠

Likely Case

Authenticated users with malicious intent could access private media files they shouldn't have permission to view, potentially exposing sensitive content.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to authorized users who already have some level of access to the system.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.5 and later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3406987

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Beaver Builder plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 2.9.5+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Restrict User Roles

all

Temporarily limit or remove Contributor-level access until patching is complete.

Disable Beaver Builder

linux

Temporarily deactivate the plugin if not essential for site functionality.

wp plugin deactivate beaver-builder-lite-version

🧯 If You Can't Patch

  • Implement strict access controls and monitor user activity for suspicious attachment access patterns.
  • Use web application firewall rules to block requests to the vulnerable 'get_attachment_sizes' function endpoint.

🔍 How to Verify

Check if Vulnerable:

Check Beaver Builder plugin version in WordPress admin under Plugins > Installed Plugins. If version is 2.9.4 or lower, the system is vulnerable.

Check Version:

wp plugin get beaver-builder-lite-version --field=version

Verify Fix Applied:

Verify plugin version is 2.9.5 or higher after update. Test with a Contributor-level account that access to private attachments is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to attachment endpoints by Contributor-level users
  • Multiple requests to /wp-json/ endpoints related to media attachments

Network Indicators:

  • HTTP requests to Beaver Builder API endpoints with parameters targeting attachment metadata

SIEM Query:

source="wordpress.log" AND ("get_attachment_sizes" OR "attachment" OR "private") AND user_role="contributor"

🔗 References

📤 Share & Export