CVE-2025-4279

HIGH

WordPress External Image Replace <1.0.8 - RCE

Title source: llm
STIX 2.1

Description

The External image replace plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'external_image_replace_get_posts::replace_post' function in all versions up to, and including, 1.0.8. This makes it possible for authenticated attackers, with contributor-level and above permissions, to upload arbitrary files on the affected site's server which may make remote code execution possible.

Scores

CVSS v3 8.8
EPSS 0.0081
EPSS Percentile 74.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-434
Status published
Products (1)
muromuro/External image replace < 1.0.8
Published May 05, 2025
Tracked Since Feb 18, 2026