Description
Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image bulk-featured-image allows Upload a Web Shell to a Web Server.This issue affects Bulk Featured Image: from n/a through <= 1.2.4.
Published: 2025-07-04
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Bulk Featured Image plugin for WordPress allows an attacker to upload files of any type, including malicious scripts such as web shells. The vulnerability is a classic Arbitrary File Upload flaw (CWE‑434) and carries a CVSS score of 9.1, indicating a high likelihood of full server compromise. Once an attacker places a web‑shell file in the upload directory, they can execute arbitrary code on the host and gain complete control of the exploited web server. The impact is confidentiality, integrity, and availability of the entire site and its underlying infrastructure.

Affected Systems

The flaw affects CreedAlly’s Bulk Featured Image plugin for WordPress versions up to and including 1.2.4. Any WordPress site that has been deployed with this plugin and has not upgraded past version 1.2.4 is susceptible to the upload flaw.

Risk and Exploitability

With a CVSS score of 9.1 and an EPSS score of less than 1 %, the vulnerability is considered severe but its exploitation probability is currently low. The attack vector is inferred to be through the normal image‑upload interface of the plugin, which requires that the user has permission to add featured images. An attacker who can authenticate or gain elevated privileges on the site—or who can trick a privileged user into uploading a malicious file—can trigger the flaw. Once triggered, the vulnerability results in full remote code execution because the web shell is executable on the server. The vulnerability is not listed in CISA’s KEV catalog, which suggests no public exploit currently in widespread use, but the high CVSS score means that defenders should treat it as a priority risk.

Generated by OpenCVE AI on May 1, 2026 at 07:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Bulk Featured Image plugin to the latest version, which removes the arbitrary file upload flaw.
  • If an upgrade is not immediately possible, restrict the plugin’s upload functionality to only allow approved image MIME types such as image/jpeg, image/png, and image/gif, and enforce strict file size limits.
  • Deploy a web application firewall or security plugin that blocks execution of uploaded scripts and validates file contents before storage.

Generated by OpenCVE AI on May 1, 2026 at 07:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19951 Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image allows Upload a Web Shell to a Web Server. This issue affects Bulk Featured Image: from n/a through 1.2.1.
History

Tue, 28 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image allows Upload a Web Shell to a Web Server. This issue affects Bulk Featured Image: from n/a through 1.2.1. Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image bulk-featured-image allows Upload a Web Shell to a Web Server.This issue affects Bulk Featured Image: from n/a through <= 1.2.4.
Title WordPress Bulk Featured Image plugin <= 1.2.1 - Arbitrary File Upload Vulnerability WordPress Bulk Featured Image plugin <= 1.2.4 - Arbitrary File Upload vulnerability
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Fri, 04 Jul 2025 09:00:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image allows Upload a Web Shell to a Web Server. This issue affects Bulk Featured Image: from n/a through 1.2.1.
Title WordPress Bulk Featured Image plugin <= 1.2.1 - Arbitrary File Upload Vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:51.628Z

Reserved: 2025-03-11T08:10:12.306Z

Link: CVE-2025-28951

cve-icon Vulnrichment

Updated: 2025-07-07T19:46:02.763Z

cve-icon NVD

Status : Deferred

Published: 2025-07-04T09:15:29.500

Modified: 2026-04-23T15:26:39.863

Link: CVE-2025-28951

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T07:15:11Z

Weaknesses