CVE-2025-11373
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-05

Last updated on: 2025-11-06

Assigner: Wordfence

Description
The Popup and Slider Builder by Depicter – Add Email collecting Popup, Popup Modal, Coupon Popup, Image Slider, Carousel Slider, Post Slider Carousel plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability checks in the "depicter-media-upload" AJAX route in all versions up to, and including, 4.0.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload limited files on the affected site's server.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-05
Last Modified
2025-11-06
Generated
2026-05-06
AI Q&A
2025-11-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
depicter popup_and_slider_builder 4.0.4
depicter popup_and_slider_builder 4.0.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Popup and Slider Builder by Depicter WordPress plugin allows authenticated users with Contributor-level access or higher to upload arbitrary files to the server due to missing capability checks in the 'depicter-media-upload' AJAX route. Essentially, the plugin did not properly verify if a user had permission to upload files, enabling limited unauthorized file uploads. This was fixed in version 4.0.5 by adding permission checks to ensure only users with the 'upload_files' capability can upload, and by adding CSRF protection to relevant AJAX endpoints. [2]


How can this vulnerability impact me? :

The vulnerability can allow an authenticated attacker with Contributor-level access or above to upload files to the affected WordPress site server. This could lead to unauthorized file uploads which might be used to upload malicious files, potentially compromising the site or server. Although the plugin restricts certain file types (e.g., disallowing PHP files), the ability to upload arbitrary files still poses a risk of misuse or exploitation. [2, 4]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized or suspicious file upload attempts to the 'depicter-media-upload' AJAX route on your WordPress site. Since the vulnerability allows authenticated users with Contributor-level access or higher to upload files without proper capability checks, you can check your web server logs or WordPress logs for POST requests to the AJAX endpoint related to 'depicter-media-upload'. Additionally, inspecting uploaded files for unexpected or unauthorized file types or filenames can help detect exploitation attempts. Specific commands depend on your environment, but for example, on a Linux server, you can use commands like: 1. To search web server logs for requests to the vulnerable AJAX route: `grep 'admin-ajax.php?action=depicter-media-upload' /var/log/apache2/access.log` (adjust path and filename as needed). 2. To find recently uploaded files in the WordPress uploads directory: `find /path/to/wp-content/uploads/ -type f -mtime -7` (files modified in the last 7 days). 3. To check for suspicious PHP files or unexpected file types: `find /path/to/wp-content/uploads/ -type f \( -name '*.php' -o -name '*.phtml' \)` 4. Use WordPress audit or security plugins that log user actions and file uploads to detect anomalous behavior. Note that the vulnerability requires authenticated users with at least Contributor role, so reviewing user activity logs for such users performing uploads can also help detect exploitation.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the Depicter Popup and Slider Builder plugin to version 4.0.5 or later, where the vulnerability is fixed by enforcing proper capability checks and CSRF protection on the 'depicter-media-upload' AJAX route. This update ensures that only users with the 'upload_files' capability can upload files and adds CSRF middleware to prevent unauthorized requests. If updating immediately is not possible, restrict access to the AJAX endpoint by limiting Contributor-level user permissions or disabling the plugin temporarily. Additionally, monitor and audit user uploads and activity for suspicious behavior. Applying the patch from version 4.0.5 is the recommended and most effective mitigation. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart