Description
The Smart Auto Upload Images plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the auto-image creation functionality in all versions up to, and including, 1.2.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Published: 2025-11-08
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file upload with potential remote code execution
Action: Patch Now
AI Analysis

Impact

The Smart Auto Upload Images plugin for WordPress lacks file type validation in its auto‑image creation feature, allowing authenticated users with Contributor-level access or higher to upload arbitrary files. If a malicious file is placed in the plugin’s upload directory and executed by the web server or application, remote code execution can be achieved, compromising the entire site.

Affected Systems

The vulnerability affects the Smart Auto Upload Images – Import External Images plugin (burhandodhy) version 1.2.0 and any earlier releases. It is installed on WordPress sites that host the plugin as any user with Contributor or greater roles can exploit the flaw.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity, but the EPSS score of less than 1% shows a low probability of exploitation at present. The flaw is not listed in the CISA KEV catalog. An attacker must first obtain valid Contributor-level credentials or compromise such an account through other means. Once authenticated, the attacker can upload a malicious file into the plugin’s upload folder, potentially leading to remote code execution if the web server or application treats the file as executable.

Generated by OpenCVE AI on April 22, 2026 at 12:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Smart Auto Upload Images plugin to version 1.2.1 or later, which adds proper file type validation.
  • Restrict the types of files that can be uploaded by configuring the plugin or the server to accept only image MIME types such as image/jpeg, image/png, and image/gif.
  • Configure the server so that the upload directory is not executed as code—ensure the directory has appropriate permissions and that files stored there cannot be run as scripts or have PHP execution disabled.

Generated by OpenCVE AI on April 22, 2026 at 12:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 10 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 10 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 08 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Smart Auto Upload Images plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the auto-image creation functionality in all versions up to, and including, 1.2.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Title Smart Auto Upload Images <= 1.2.0 - Authenticated (Contributor+) Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:04:54.975Z

Reserved: 2025-10-24T13:31:34.382Z

Link: CVE-2025-12161

cve-icon Vulnrichment

Updated: 2025-11-10T14:08:08.967Z

cve-icon NVD

Status : Deferred

Published: 2025-11-08T04:15:44.677

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12161

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T13:00:09Z

Weaknesses