CVE-2025-9218

3.7 LOW

📋 TL;DR

The rtMedia plugin for WordPress (also used with BuddyPress and bbPress) versions 4.7.0 to 4.7.3 has an information disclosure vulnerability when the Godam plugin is active. Unauthenticated attackers can access media files from draft or private posts that should be restricted. This affects WordPress sites using these specific plugin versions.

💻 Affected Systems

Products:
  • rtMedia for WordPress, BuddyPress and bbPress
Versions: 4.7.0 to 4.7.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Godam plugin to be active alongside rtMedia for the vulnerability to be exploitable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive media files from private posts or drafts are exposed to the public internet, potentially revealing confidential information, intellectual property, or personal data.

🟠

Likely Case

Unauthorized users access media files that should be restricted to authenticated users, violating content privacy expectations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential privacy violations without system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires the Godam plugin to be active and involves accessing REST API endpoints without proper authorization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.7.4

Vendor Advisory: https://wordpress.org/plugins/buddypress-media/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'rtMedia for WordPress, BuddyPress and bbPress'. 4. Click 'Update Now' if available, or download version 4.7.4 from WordPress repository. 5. Deactivate and delete old version, then upload and activate 4.7.4.

🔧 Temporary Workarounds

Deactivate Godam Plugin

all

Temporarily disable the Godam plugin to prevent exploitation until patching is complete.

wp plugin deactivate godam

Restrict REST API Access

all

Add firewall rules to restrict unauthenticated access to WordPress REST API endpoints.

🧯 If You Can't Patch

  • Deactivate the rtMedia plugin or Godam plugin immediately
  • Implement web application firewall rules to block suspicious REST API requests

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for rtMedia version. If version is between 4.7.0 and 4.7.3 and Godam plugin is active, the system is vulnerable.

Check Version:

wp plugin get buddypress-media --field=version

Verify Fix Applied:

Verify rtMedia plugin version is 4.7.4 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual REST API requests to media endpoints from unauthenticated users
  • Access patterns to /wp-json/rtmedia/ endpoints without authentication

Network Indicators:

  • HTTP GET requests to WordPress REST API media endpoints without authentication headers

SIEM Query:

source="wordpress.log" AND "wp-json/rtmedia" AND status=200 AND user="-"

🔗 References

📤 Share & Export