The Restrict File Access plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.2 via the output() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
History

Tue, 17 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 14 Jun 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Restrict File Access plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.2 via the output() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Title Restrict File Access <= 1.1.2 - Authenticated (Subscriber+) Arbitrary File Read
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-06-14T08:23:25.593Z

Updated: 2025-06-17T18:39:04.398Z

Reserved: 2025-06-13T14:24:54.975Z

Link: CVE-2025-6070

cve-icon Vulnrichment

Updated: 2025-06-16T16:47:12.450Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-14T09:15:25.180

Modified: 2025-06-16T12:32:18.840

Link: CVE-2025-6070

cve-icon Redhat

No data.