CVE-2025-7518

The RSFirewall! plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.1.42 via the get_local_filename() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Configurations

No configuration.

History

15 Jul 2025, 13:14

Type Values Removed Values Added
Summary
  • (es) El complemento RSFirewall! para WordPress es vulnerable a la travesía de rutas en todas las versiones hasta la 1.1.42 incluida, mediante la función get_local_filename(). Esto permite a atacantes autenticados, con acceso de administrador o superior, leer el contenido de archivos arbitrarios en el servidor, que pueden contener información confidencial.

12 Jul 2025, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-12 10:15

Updated : 2025-07-15 13:14


NVD link : CVE-2025-7518

Mitre link : CVE-2025-7518

CVE.ORG link : CVE-2025-7518


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')