The Restrict File Access plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.2 via the output() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Metrics
Affected Vendors & Products
References
History
Sat, 14 Jun 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Restrict File Access plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.2 via the output() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | |
Title | Restrict File Access <= 1.1.2 - Authenticated (Subscriber+) Arbitrary File Read | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-06-14T08:23:25.593Z
Updated: 2025-06-14T08:23:25.593Z
Reserved: 2025-06-13T14:24:54.975Z
Link: CVE-2025-6070

No data.

Status : Received
Published: 2025-06-14T09:15:25.180
Modified: 2025-06-14T09:15:25.180
Link: CVE-2025-6070

No data.