Description
Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image bulk-featured-image allows Upload a Web Shell to a Web Server.This issue affects Bulk Featured Image: from n/a through <= 1.2.4.
Published: 2025-09-05
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The CreedAlly Bulk Featured Image plugin for WordPress allows unrestricted uploads of files with dangerous types, as defined by CWE‑434. An attacker can upload a Web Shell to the server and subsequently execute arbitrary code with the privileges of the web server process. The vulnerability directly compromises confidentiality, integrity and availability of the affected site.

Affected Systems

WordPress installations that use the CreedAlly Bulk Featured Image plugin version 1.2.4 or earlier are impacted. The plugin provides a bulk upload interface for featured images, allowing attackers to exploit the vulnerability if the plugin is present.

Risk and Exploitability

The CVSS score of 9.1 indicates a high severity. The EPSS score of <1% suggests that widespread exploitation has not yet been documented, but the potential for server compromise remains significant. The likely attack vector is the plugin’s file‑upload endpoint, which is usually protected behind authenticated WordPress admin access, so an attacker would need to compromise or bypass the site’s authentication. Once an attacker can upload a malicious file, arbitrary code execution can be achieved. The vulnerability is not listed in the CISA KEV catalog, but the confluence of a known arbitrary file‑upload flaw and a high CVSS score warrants immediate remediation.

Generated by OpenCVE AI on April 30, 2026 at 15:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update CreedAlly Bulk Featured Image to the latest patched release or any version newer than 1.2.4, as offered by the vendor.
  • If an upgrade is not feasible, restrict or block the plugin’s file upload endpoint or enforce strict image MIME type validation via a WAF.
  • Implement server‑side validation to only accept JPG, PNG, GIF and store uploads outside the web root to prevent execution.

Generated by OpenCVE AI on April 30, 2026 at 15:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-26958 Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image allows Upload a Web Shell to a Web Server. This issue affects Bulk Featured Image: from n/a through 1.2.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image allows Upload a Web Shell to a Web Server. This issue affects Bulk Featured Image: from n/a through 1.2.2. Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image bulk-featured-image allows Upload a Web Shell to a Web Server.This issue affects Bulk Featured Image: from n/a through <= 1.2.4.
Title WordPress Bulk Featured Image Plugin <= 1.2.2 - Arbitrary File Upload Vulnerability WordPress Bulk Featured Image plugin <= 1.2.4 - Arbitrary File Upload vulnerability
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Sun, 07 Sep 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 05 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 05 Sep 2025 14:00:00 +0000

Type Values Removed Values Added
Description Unrestricted Upload of File with Dangerous Type vulnerability in CreedAlly Bulk Featured Image allows Upload a Web Shell to a Web Server. This issue affects Bulk Featured Image: from n/a through 1.2.2.
Title WordPress Bulk Featured Image Plugin <= 1.2.2 - Arbitrary File Upload Vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:47.713Z

Reserved: 2025-09-05T10:49:25.892Z

Link: CVE-2025-58819

cve-icon Vulnrichment

Updated: 2025-09-05T15:47:22.569Z

cve-icon NVD

Status : Deferred

Published: 2025-09-05T14:15:53.233

Modified: 2026-04-23T15:33:41.753

Link: CVE-2025-58819

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T15:30:16Z

Weaknesses