Podlove security issue CVE-2025-10147 Thursday 25th September 2025 11:47:41


Make sure your Podlove Publisher is updated to v4.2.7 (published September 20). It fixes an exploit (published September 22) that is actively being used to upload malicious code to WordPress instances.

https://fosstodon.org/@podlove/115262045089697398

We have done several things by now:

  • All WordPress installations that have been already infected are taken down and the respective users informed (luckily only a rather small number)
  • All instances where we could update an exploitable Podlove plugin through "wp plugin update" have been updated by us
  • All instances where we could find an exploitable Podlove plugin but could not automatically update it have been collected for sending out instructions
  • We have implemented filters in our nginx that should reliably deny access to all HTTPS requests that try to exploit a Podlove plugin before the request even reaches PHP

Details about the above can be found in our blogpost (in German) about this matter:

https://blog.uberspace.de/2025/09/was-wir-gegen-podlove-exploits-tun/

We are taking steps to take infected Podlove instances offline and protect the other ones from infection. As a result, some images will not be visible on your site. Please contact hallo@uberspace.de, if you are experiencing issues.