CVE-2025-14632
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-17

Last updated on: 2026-01-17

Assigner: Wordfence

Description
The Filr – Secure document library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via unrestricted file upload in all versions up to, and including, 1.2.11 due to insufficient file type restrictions in the FILR_Uploader class. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload malicious HTML files containing JavaScript that will execute whenever a user accesses the uploaded file, granted they have permission to create or edit posts with the 'filr' post type.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-17
Last Modified
2026-01-17
Generated
2026-05-07
AI Q&A
2026-01-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
unknown_vendor filr_protection to 1.2.11 (inc)
unknown_vendor filr_protection 1.2.12
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the Filr – Secure document library plugin for WordPress. It occurs because the plugin's file upload component (FILR_Uploader class) does not sufficiently restrict the types of files that can be uploaded. Specifically, authenticated users with Administrator-level access or higher can upload malicious HTML files containing JavaScript. When other users with permission to create or edit 'filr' post types access these uploaded files, the malicious JavaScript executes, potentially compromising their security. [2, 4]


How can this vulnerability impact me? :

This vulnerability can allow attackers with administrator-level access to upload malicious HTML files that execute JavaScript in the context of users who view or edit the affected 'filr' post types. This can lead to unauthorized actions such as stealing user credentials, session hijacking, or performing actions on behalf of other users. The CVSS score indicates a moderate impact with potential confidentiality and integrity loss but no availability impact.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking for the presence of the vulnerable Filr plugin versions (up to and including 1.2.11) on your WordPress installation and monitoring for suspicious file uploads, especially HTML files containing JavaScript uploaded by users with Administrator-level access or higher. Since the vulnerability is a Stored Cross-Site Scripting via unrestricted file upload, you can look for uploaded files with disallowed extensions (like .html) in the upload directories related to the 'filr' post type. Commands to detect suspicious files could include scanning the upload directories for unexpected file types or recently modified files. For example, on a Linux server hosting WordPress, you might run commands like: 1. Find recently uploaded HTML files: ```bash find /path/to/wordpress/wp-content/uploads/ -type f -name '*.html' -mtime -7 ``` 2. Search for files containing suspicious JavaScript: ```bash grep -ril '<script' /path/to/wordpress/wp-content/uploads/ ``` 3. Check plugin version installed: ```bash wp plugin get filr-protection --field=version ``` These commands help identify potentially malicious uploaded files and verify if the vulnerable plugin version is in use. Additionally, monitoring logs for file upload activities by administrator users may help detect exploitation attempts. [2, 4]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading the Filr plugin to version 1.2.12 or later, where the vulnerability is addressed by implementing strict file type restrictions and validation in the FILR_Uploader class. Until the upgrade can be applied, restrict Administrator-level users from uploading files via the Filr plugin or disable the plugin entirely to prevent exploitation. Additionally, review and tighten file upload permissions and monitor uploaded files for suspicious content. Implementing web application firewall (WAF) rules to block malicious file uploads and scanning existing uploads for malicious HTML or JavaScript files can also help mitigate risk. [2, 4, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart