Description
The Brizy – Page Builder plugin for WordPress is vulnerable to limited file uploads due to missing authorization on process_external_asset_urls function as well as missing path validation in store_file function in all versions up to, and including, 2.6.20. This makes it possible for unauthenticated attackers to upload .TXT files on the affected site's server.
Published: 2025-07-29
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated File Upload
Action: Patch
AI Analysis

Impact

The Brizy – Page Builder plugin for WordPress is vulnerable to a limited file upload flaw caused by missing authorization checks in the process_external_asset_urls function and insufficient path validation in the store_file function. The issue allows an unauthenticated user to upload .TXT files to the application’s file system, giving the attacker the ability to place arbitrary content on the server. The upload limitation is specific to .TXT files, but the presence of user-supplied files could be leveraged by an attacker to craft subsequent attacks that rely on the existence of that content, potentially affecting confidentiality and data integrity. This flaw represents a moderate risk to the affected WordPress site, as it permits the attacker to add files without authentication but does not grant immediate code execution.

Affected Systems

All installations of the themefusecom Brizy – Page Builder plugin for WordPress up to and including version 2.6.20 are affected. The vulnerability is present in the free WordPress edition. The plugin versions listed in the known references indicate the flaw exists in tags 2.6.17 and earlier.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity. The EPSS score of <1% suggests a very low probability of exploitation at the time of analysis, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is a web application request to the vulnerable upload endpoints, which does not require authentication. An attacker can exploit the flaw by sending a crafted HTTP request that triggers the asset processing functions, resulting in a .TXT file being stored on the server.

Generated by OpenCVE AI on April 20, 2026 at 22:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Brizy plugin to a version that includes the fix for this vulnerability (e.g., 2.6.21 or later).
  • If an immediate upgrade is not possible, block the upload of .TXT files or the vulnerable endpoints by adjusting WordPress media settings or using a security plugin to deny access to the affected functions.
  • As a temporary safeguard, deactivate the Brizy plugin until the patch is applied to prevent unauthenticated file uploads.

Generated by OpenCVE AI on April 20, 2026 at 22:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-22964 The Brizy – Page Builder plugin for WordPress is vulnerable to limited file uploads due to missing authorization on process_external_asset_urls function as well as missing path validation in store_file function in all versions up to, and including, 2.6.20. This makes it possible for unauthenticated attackers to upload .TXT files on the affected site's server.
History

Mon, 11 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:brizy:brizy:*:*:*:*:free:wordpress:*:*

Tue, 29 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 29 Jul 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Brizy
Brizy brizy
Brizy brizy-page Builder
Wordpress
Wordpress wordpress
Vendors & Products Brizy
Brizy brizy
Brizy brizy-page Builder
Wordpress
Wordpress wordpress

Tue, 29 Jul 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Brizy – Page Builder plugin for WordPress is vulnerable to limited file uploads due to missing authorization on process_external_asset_urls function as well as missing path validation in store_file function in all versions up to, and including, 2.6.20. This makes it possible for unauthenticated attackers to upload .TXT files on the affected site's server.
Title Brizy <= 2.6.20 - Missing Authorization to Unauthenticated Limited File Upload
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Brizy Brizy Brizy-page Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:27:30.972Z

Reserved: 2025-05-05T19:49:56.278Z

Link: CVE-2025-4370

cve-icon Vulnrichment

Updated: 2025-07-29T14:02:58.850Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-29T05:15:31.213

Modified: 2025-08-11T19:04:09.220

Link: CVE-2025-4370

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:15:06Z

Weaknesses