The Restrict File Access plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.2 via the output() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
History

Sat, 14 Jun 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Restrict File Access plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.2 via the output() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Title Restrict File Access <= 1.1.2 - Authenticated (Subscriber+) Arbitrary File Read
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-06-14T08:23:25.593Z

Updated: 2025-06-14T08:23:25.593Z

Reserved: 2025-06-13T14:24:54.975Z

Link: CVE-2025-6070

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-06-14T09:15:25.180

Modified: 2025-06-14T09:15:25.180

Link: CVE-2025-6070

cve-icon Redhat

No data.