Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-28951 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Arbitrary File Upload vulnerability in 'Bulk Featured Image' plugin. <br>πŸ’₯ **Consequences**: Attackers can upload **Web Shells**, leading to full server compromise, data theft, and site defacement.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-434 (Unrestricted Upload of File with Dangerous Type).…

Q3Who is affected? (Versions/Components)

πŸ‘₯ **Affected**: Vendor: **CreedAlly**. <br>πŸ“¦ **Product**: Bulk Featured Image. <br>πŸ“‰ **Version**: **1.2.1 and earlier** versions.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hacker Actions**: Gain **Remote Code Execution (RCE)**. <br>πŸ“‚ **Data Access**: Read/Write arbitrary files, execute system commands, and potentially take over the entire WordPress installation.

Q5Is exploitation threshold high? (Auth/Config)

πŸ” **Threshold**: **Medium**. <br>πŸ“ **Auth Required**: **PR:H** (High Privileges Required). <br>βš™οΈ **Config**: UI:N (No User Interaction). Requires authenticated access to the WordPress admin/dashboard.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exploit**: **No** public PoC or wild exploitation detected in the provided data. <br>⚠️ **Risk**: Despite no public code, the CVSS score is **Critical (9.8)**, indicating high theoretical exploitability.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: <br>1. Check WordPress Plugins list for **Bulk Featured Image**. <br>2. Verify version is **≀ 1.2.1**. <br>3. Scan for unauthorized PHP files in upload directories.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update the plugin to the latest version immediately. <br>πŸ“š **Reference**: Patchstack database entry confirms the vulnerability and fix availability.

Q9What if no patch? (Workaround)

🚧 **Workaround (No Patch)**: <br>1. **Deactivate/Uninstall** the plugin if not essential. <br>2. Restrict file upload permissions in `wp-config.php` or server config. <br>3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. <br>πŸ“… **Priority**: **Immediate Action Required**. <br>πŸ’‘ **Reason**: CVSS 9.8 score + Web Shell capability = High impact. Do not delay patching.