The WP01 plugin for WordPress is vulnerable to Arbitrary File Download in all versions up to, and including, 2.6.2 due to a missing capability check and insufficient restrictions on the make_archive() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information.
References
Configurations
History
28 Mar 2025, 15:41
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | () https://plugins.trac.wordpress.org/browser/wp01/trunk/inc/class-wp01.php#L109 - Product | |
References | () https://wordpress.org/plugins/wp01/ - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/900d09e8-ded5-49b9-81bf-ddfc85d3cf2b?source=cve - Third Party Advisory | |
First Time |
Wp01ru wp01
Wp01ru |
|
CPE | cpe:2.3:a:wp01ru:wp01:*:*:*:*:*:wordpress:*:* | |
Summary |
|
15 Mar 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-15 04:15
Updated : 2025-03-28 15:41
NVD link : CVE-2025-2267
Mitre link : CVE-2025-2267
CVE.ORG link : CVE-2025-2267
JSON object : View
Products Affected
wp01ru
- wp01
CWE