
Cloud Vulnerability DB
A community-led vulnerabilities database
Missing Authorization vulnerability (CVE-2025-62909) was discovered in mrityunjay Smart WeTransfer WordPress plugin versions through 1.3. The vulnerability was disclosed on October 26, 2025, and involves incorrectly configured access control security levels (NVD, AttackerKB).
The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (High), with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N. This indicates that the vulnerability can be exploited over the network, requires low attack complexity, needs low privileges, requires no user interaction, has unchanged scope, and can result in high impact to both confidentiality and integrity, while having no impact on availability (AttackerKB).
The vulnerability can lead to high impacts on both confidentiality and integrity of the affected systems, as indicated by the CVSS scoring. The attack vector being network-based with low complexity requirements makes this a significant security concern for affected installations (AttackerKB).
Users running Smart WeTransfer plugin version 1.3 or earlier should upgrade to a patched version when available. As this is a broken access control vulnerability, implementing proper access control mechanisms and security configurations is recommended (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."