Description
The Simple Local Avatars plugin for WordPress is vulnerable to unauthorized modification of data in version 2.8.4. This is due to a missing capability check on the migrate_from_wp_user_avatar() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to migrate avatar metadata for all users.
Published: 2025-08-12
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized avatar metadata modification
Action: Update plugin
AI Analysis

Impact

The Simple Local Avatars plugin suffers from a missing capability check on the migrate_from_wp_user_avatar function, allowing any authenticated user with at least subscriber-level access to trigger a migration that rewrites avatar metadata for every user on the site. Because this alteration changes data that is typically protected, the impact is primarily the integrity of user avatar information, potentially enabling impersonation or denial of service if avatars are corrupted.

Affected Systems

The vulnerability is limited to the 10up Simple Local Avatars plugin version 2.8.4 for WordPress. No other versions or plugins are affected.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate impact, while the EPSS of less than 1% reflects a very low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, suggesting no evidence of widespread, targeted use. The attack vector requires an authenticated account, so the risk is principally to sites that grant subscriber-level access and might be exploited by malicious or compromised users with such roles. Because the flaw is a straightforward missing authorization check, an attacker who has logged in can easily invoke the function without additional escalation.

Generated by OpenCVE AI on April 21, 2026 at 03:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Simple Local Avatars plugin to a version that implements the missing capability check
  • Configure role capabilities so that only administrators can perform avatar migrations
  • Audit existing avatar metadata for anomalies and restore from backups if discrepancies are found

Generated by OpenCVE AI on April 21, 2026 at 03:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-24225 The Simple Local Avatars plugin for WordPress is vulnerable to unauthorized modification of data in version 2.8.4. This is due to a missing capability check on the migrate_from_wp_user_avatar() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to migrate avatar metadata for all users.
History

Tue, 12 Aug 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared 10up
10up simple Local Avatars
Wordpress
Wordpress wordpress
Vendors & Products 10up
10up simple Local Avatars
Wordpress
Wordpress wordpress

Tue, 12 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 Aug 2025 06:45:00 +0000

Type Values Removed Values Added
Description The Simple Local Avatars plugin for WordPress is vulnerable to unauthorized modification of data in version 2.8.4. This is due to a missing capability check on the migrate_from_wp_user_avatar() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to migrate avatar metadata for all users.
Title Simple Local Avatars <= 2.8.4 - Missing Authorization to Authenticated (Subscriber+) Avatar Migration
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

10up Simple Local Avatars
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:58:44.811Z

Reserved: 2025-08-01T17:50:18.360Z

Link: CVE-2025-8482

cve-icon Vulnrichment

Updated: 2025-08-12T16:04:28.250Z

cve-icon NVD

Status : Deferred

Published: 2025-08-12T07:15:30.543

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8482

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:45:27Z

Weaknesses