The ERI File Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'erifl_file' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to download files restricted to specific user roles.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Apos37
         Apos37 eri File Library Wordpress Wordpress wordpress  | 
|
| Vendors & Products | 
        
        Apos37
         Apos37 eri File Library Wordpress Wordpress wordpress  | 
Fri, 31 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Fri, 31 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The ERI File Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'erifl_file' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to download files restricted to specific user roles. | |
| Title | ERI File Library <= 1.1.0 - Missing Authorization to Unauthenticated Protected File Download | |
| Weaknesses | CWE-862 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
  | 
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-10-31T09:27:20.353Z
Updated: 2025-10-31T18:43:16.544Z
Reserved: 2025-10-21T18:43:27.936Z
Link: CVE-2025-12041
Updated: 2025-10-31T18:43:10.499Z
Status : Received
Published: 2025-10-31T10:15:42.997
Modified: 2025-10-31T10:15:42.997
Link: CVE-2025-12041
No data.