VYPR
Medium severity5.4NVD Advisory· Published Dec 16, 2025· Updated Apr 27, 2026

CVE-2025-66134

CVE-2025-66134

Description

Missing Authorization vulnerability in NinjaTeam FileBird Pro filebird-pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FileBird Pro: from n/a through <= 6.5.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in FileBird Pro <=6.5.1 allows unauthenticated attackers to exploit incorrect access control levels.

Vulnerability

Overview

The FileBird Pro WordPress plugin by NinjaTeam contains a missing authorization vulnerability (broken access control) in versions up to and including 6.5.1. The root cause is an incorrectly configured access control security level, which allows functions to be executed without proper authentication or nonce checks [1].

Exploitation

An unauthenticated attacker can exploit this flaw remotely without needing any special privileges. By sending crafted requests, the attacker can trigger privileged actions that normally require higher-level permissions. The vulnerability is of particular concern because such broken access control issues are often used in mass-exploit campaigns targeting thousands of WordPress sites regardless of their size or popularity [1].

Impact

Successful exploitation could allow an attacker to perform unauthorized actions that compromise the site's security. The CVSS v3 score of 5.4 (Medium) indicates a moderate severity, though the vendor notes a low likelihood of exploitation in practice. Nevertheless, the ability to bypass access controls can lead to partial loss of data confidentiality, integrity, or availability depending on the specific action invoked.

Mitigation

The issue has been patched in version 6.5.2. Users are strongly advised to update immediately. For Patchstack users, enabling auto-update for vulnerable plugins provides additional protection. If an immediate update is not possible, contacting a hosting provider or web developer for assistance is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.