CVE-2025-30960

8.3 HIGH

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the FS Poster WordPress plugin that allows unauthorized users to perform actions intended only for authenticated administrators. The vulnerability affects all WordPress sites running FS Poster versions up to 6.5.8, potentially enabling attackers to modify plugin settings or post content without proper authentication.

💻 Affected Systems

Products:
  • FS Poster WordPress Plugin
Versions: n/a through 6.5.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with FS Poster plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain administrative control over the FS Poster functionality, potentially posting unauthorized content to connected social media accounts, modifying plugin configurations, or accessing sensitive posting credentials.

🟠

Likely Case

Unauthorized users could post content to connected social media platforms using the site's credentials, potentially damaging the organization's reputation or spreading malicious content.

🟢

If Mitigated

With proper network segmentation and access controls, the impact would be limited to the WordPress instance itself without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is publicly documented with proof-of-concept available, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5.9 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/fs-poster/vulnerability/wordpress-fs-poster-plugin-6-5-8-subscriber-site-wide-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find FS Poster and click 'Update Now'. 4. Verify update to version 6.5.9 or higher.

🔧 Temporary Workarounds

Disable FS Poster Plugin

all

Temporarily deactivate the vulnerable plugin until patching is possible

wp plugin deactivate fs-poster

Restrict Access via Web Application Firewall

all

Block unauthorized access to FS Poster endpoints

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the WordPress admin interface
  • Monitor for unusual posting activity or configuration changes in FS Poster logs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for FS Poster version 6.5.8 or earlier

Check Version:

wp plugin get fs-poster --field=version

Verify Fix Applied:

Verify FS Poster version is 6.5.9 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /wp-admin/admin-ajax.php with fs_poster actions
  • Unexpected social media posts from the site's accounts

Network Indicators:

  • Unusual outbound traffic to social media APIs from the WordPress server

SIEM Query:

source="wordpress" AND (uri_path="/wp-admin/admin-ajax.php" AND post_data CONTAINS "fs_poster") AND user_agent NOT IN ["admin_user_agents"]

🔗 References

📤 Share & Export