- Description
- The File Away plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers, leveraging the use of a reversible weak algorithm, to read the contents of arbitrary files on the server, which can contain sensitive information.
- Source
- security@wordfence.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
- security@wordfence.com
- CWE-327
- Hype score
- Not currently trending
๐จ CVE-2025-2539 ๐ด HIGH (7.5) ๐ข thomstark - File Away ๐๏ธ * ๐ https://t.co/ZCdp5FnHYP ๐ https://t.co/Dzc3tfmlpI ๐ https://t.co/9qlJHYN3zs ๐ https://t.co/i7MLEnbVmO #CyberCron #VulnAlert #InfoSec https://t.co/ObGGRCQ73R
@cybercronai
21 Mar 2025
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๏ฟฝ๏ฟฝ CVE-2025-2539 - WordPress - HIGH ๐จ ๐๏ธ Date published 2025-03-20 12:15:14 UTC #WordPress #CyberSecurity #InfoSec #Vulnerability #TechNews https://t.co/y9ydwaO9Dz
@vulns_space
20 Mar 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes