First published: Sat Apr 26 2025(Updated: )
The Aeropage Sync for Airtable plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aeropage_media_downloader' function in all versions up to, and including, 3.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aeropage Sync for Airtable | <=3.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3914 has a high severity level due to the potential for arbitrary file uploads.
To fix CVE-2025-3914, update the Aeropage Sync for Airtable plugin to version 3.2.1 or later.
CVE-2025-3914 can be exploited by authenticated users with Subscriber role or higher.
CVE-2025-3914 allows attackers to upload arbitrary file types, posing a significant security risk.
Yes, CVE-2025-3914 affects all versions of the Aeropage Sync for Airtable plugin up to and including 3.2.0.