CVE-2025-14632

4.4 MEDIUM

📋 TL;DR

The Filr WordPress plugin allows authenticated administrators to upload malicious HTML files containing JavaScript due to insufficient file type validation. This stored XSS vulnerability enables attackers with admin privileges to execute arbitrary code when users access uploaded files. Only WordPress sites using Filr plugin versions up to 1.2.11 are affected.

💻 Affected Systems

Products:
  • Filr – Secure document library WordPress plugin
Versions: All versions up to and including 1.2.11
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated attacker with Administrator-level access or ability to create/edit 'filr' post type content.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leads to full site takeover, data theft, malware distribution to visitors, and complete defacement.

🟠

Likely Case

Malicious administrator uploads HTML files with JavaScript that executes in victims' browsers, potentially stealing session cookies or performing actions as authenticated users.

🟢

If Mitigated

With proper file upload restrictions and content security policies, impact is limited to file storage abuse without code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin privileges but is straightforward once authenticated. Attackers can upload HTML files directly through the vulnerable upload functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.12 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3425333%40filr-protection&new=3425333%40filr-protection&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Filr plugin and click 'Update Now'. 4. Verify version is 1.2.12 or higher.

🔧 Temporary Workarounds

Restrict file upload permissions

all

Limit 'filr' post type creation/editing to trusted administrators only

Implement web application firewall rules

all

Block HTML file uploads through the Filr plugin endpoint

🧯 If You Can't Patch

  • Temporarily disable the Filr plugin until patching is possible
  • Implement strict file upload validation at the web server level to reject HTML files

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Filr → Version. If version is 1.2.11 or lower, system is vulnerable.

Check Version:

wp plugin list --name=filr --field=version

Verify Fix Applied:

After updating, confirm plugin version is 1.2.12 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML file uploads via Filr endpoints
  • Multiple file upload attempts with different extensions

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=filr_upload containing HTML content

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND parameters.action="filr_upload" AND (file_extension="html" OR file_extension="htm"))

🔗 References

📤 Share & Export