Multiple vulnerabilities in Aeropage Sync for Airtable plugin for WordPress



| Updated: 2025-05-02
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2025-3914
CVE-2025-3915
CWE-ID CWE-434
CWE-862
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Aeropage Sync for Airtable
Web applications / Modules and components for CMS

Vendor Aeropage

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Arbitrary file upload

EUVDB-ID: #VU108002

Risk: Medium

CVSSv4.0: 7.4 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2025-3914

CWE-ID: CWE-434 - Unrestricted Upload of File with Dangerous Type

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload in the "aeropage_media_downloader" function. A remote user can upload a malicious file and execute it on the server.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Aeropage Sync for Airtable: 3.0.0 - 3.2.0

CPE2.3 External links

https://plugins.trac.wordpress.org/browser/aeropage-sync-for-airtable/trunk/aeropage.php#L1214
https://plugins.trac.wordpress.org/browser/aeropage-sync-for-airtable/trunk/aeropage.php#L1215
https://plugins.trac.wordpress.org/browser/aeropage-sync-for-airtable/trunk/aeropage.php#L1250
https://plugins.trac.wordpress.org/changeset/3281904/
https://www.wordfence.com/threat-intel/vulnerabilities/id/a501c2d6-cdcc-4003-99df-245f5253e20f?source=cve


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

2) Missing Authorization

EUVDB-ID: #VU108003

Risk: Medium

CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2025-3915

CWE-ID: CWE-862 - Missing Authorization

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authorization checks.

The vulnerability exists due to a missing capability check in the "aeropageDeletePost" function. A remote user can delete arbitrary posts.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Aeropage Sync for Airtable: 3.0.0 - 3.2.0

CPE2.3 External links

https://plugins.trac.wordpress.org/browser/aeropage-sync-for-airtable/trunk/aeropage.php#L475
https://plugins.trac.wordpress.org/browser/aeropage-sync-for-airtable/trunk/aeropage.php#L476
https://plugins.trac.wordpress.org/changeset/3281904/
https://www.wordfence.com/threat-intel/vulnerabilities/id/f98aab54-877b-47df-9c8a-5e70ea985c1c?source=cve


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###