The Restrict File Access plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.2 via the output() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 14 Jun 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Restrict File Access plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.2 via the output() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | |
Title | Restrict File Access <= 1.1.2 - Authenticated (Subscriber+) Arbitrary File Read | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-06-14T08:23:25.593Z
Updated: 2025-06-17T18:39:04.398Z
Reserved: 2025-06-13T14:24:54.975Z
Link: CVE-2025-6070

Updated: 2025-06-16T16:47:12.450Z

Status : Awaiting Analysis
Published: 2025-06-14T09:15:25.180
Modified: 2025-06-16T12:32:18.840
Link: CVE-2025-6070

No data.