CVE-2025-8482
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-12

Last updated on: 2025-08-12

Assigner: Wordfence

Description
The Simple Local Avatars plugin for WordPress is vulnerable to unauthorized modification of data in version 2.8.4. This is due to a missing capability check on the migrate_from_wp_user_avatar() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to migrate avatar metadata for all users.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-12
Last Modified
2025-08-12
Generated
2026-05-06
AI Q&A
2025-08-12
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordfence simple_local_avatars 2.8.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Simple Local Avatars WordPress plugin version 2.8.4. It is caused by a missing capability check in the migrate_from_wp_user_avatar() function, which allows authenticated users with subscriber-level access or higher to modify avatar metadata for all users without proper authorization.


How can this vulnerability impact me? :

An attacker with subscriber-level access or above can exploit this vulnerability to migrate or modify avatar metadata for any user on the WordPress site. This unauthorized modification could lead to data integrity issues or misuse of user profile information related to avatars.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can involve checking if the Simple Local Avatars plugin version 2.8.4 is installed and active on your WordPress site, as this version contains the vulnerability. Since the vulnerability allows authenticated users with subscriber-level access to migrate avatar metadata without proper capability checks, monitoring for unusual avatar metadata changes or migrations initiated by low-privilege users could indicate exploitation. Specific commands are not provided in the resources, but you can check the plugin version via WP-CLI with: `wp plugin list --status=active` and look for 'simple-local-avatars' version 2.8.4. Additionally, reviewing user meta changes related to avatars in the database may help detect unauthorized modifications. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Simple Local Avatars plugin to a version newer than 2.8.4 where the missing capability check in the migrate_from_wp_user_avatar() function is fixed. If an update is not immediately available, restrict user permissions to prevent subscriber-level users from accessing avatar migration functionality or disable the plugin temporarily. Monitoring and auditing avatar metadata changes can also help detect exploitation attempts. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart