VYPR
Medium severity4.9NVD Advisory· Published Dec 2, 2025· Updated Apr 15, 2026

CVE-2025-12630

CVE-2025-12630

Description

The Upload.am WordPress plugin before 1.0.1 is vulnerable to arbitrary option disclosure due to a missing capability check on its AJAX request handler, allowing users such as contributor to view site options.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Upload.am WordPress plugin before 1.0.1 lacks a capability check on an AJAX handler, allowing contributor-level users to read arbitrary site options.

Vulnerability

Overview

The Upload.am File Hosting VPN WordPress plugin, versions prior to 1.0.1, contains a missing capability check in one of its AJAX request handlers. This flaw allows any authenticated user with at least Contributor-level access to retrieve arbitrary site options from the WordPress database. The vulnerability was discovered by researcher Beatriz Fresno Naumova and reported via WPScan [1].

Exploitation

Prerequisites

An attacker must have a valid WordPress user account with Contributor privileges or higher. No additional authentication is required beyond the standard session. The vulnerable AJAX endpoint does not verify the user's permissions before returning sensitive configuration data, making it trivial for a low-privileged user to enumerate site options [1].

Impact

By exploiting this vulnerability, an attacker can read arbitrary WordPress options, which may include database credentials, API keys, secret salts, and other sensitive configuration values. This information could be leveraged to further compromise the site or escalate privileges. The CVSS v3 base score is 4.9 (Medium), reflecting the need for authenticated access but the potential for high-value data exposure [1].

Mitigation

The issue is fixed in version 1.0.1 of the plugin. Users are strongly advised to update immediately. No workaround is available for older versions. The vulnerability was publicly disclosed on September 29, 2025, and added to the WPScan database on November 4, 2025 [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.