Vulnerability Description
The Microsoft Azure Storage for WordPress plugin for WordPress is vulnerable to Unauthorized Arbitrary Media Deletion in all versions up to, and including, 4.5.1. This is due to missing capability checks on the 'azure-storage-media-replace' AJAX action. This makes it possible for authenticated attackers with subscriber-level access and above to delete arbitrary media files from the WordPress Media Library via the replace_attachment parameter granted they can access the nonce which is exposed to all authenticated users.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/windows-azure-storage/tags/4.5.1/incl
- https://plugins.trac.wordpress.org/browser/windows-azure-storage/tags/4.5.1/incl
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e1b80852-a221-4c2c-b76
FAQ
What is CVE-2025-10749?
CVE-2025-10749 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The Microsoft Azure Storage for WordPress plugin for WordPress is vulnerable to Unauthorized Arbitrary Media Deletion in all versions up to, and including, 4.5.1. This is due to missing capability che...
How severe is CVE-2025-10749?
CVE-2025-10749 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-10749?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.