The WP Editor plugin for WordPress is vulnerable to arbitrary file update due to missing file path validation in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to overwrite arbitrary files on the affected site's server which may make remote code execution possible assuming the files can be written to by the web server.
References
Configurations
History
09 Jul 2025, 20:03
Type | Values Removed | Values Added |
---|---|---|
First Time |
Benjaminrojas
Benjaminrojas wp Editor |
|
Summary |
|
|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3269832%40wp-editor%2Ftrunk&old=3151053%40wp-editor%2Ftrunk&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/9298820e-3753-41b3-8ba6-9fb494e215a8?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:benjaminrojas:wp_editor:*:*:*:*:*:wordpress:*:* |
17 Apr 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-17 06:15
Updated : 2025-07-09 20:03
NVD link : CVE-2025-3294
Mitre link : CVE-2025-3294
CVE.ORG link : CVE-2025-3294
JSON object : View
Products Affected
benjaminrojas
- wp_editor
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')