Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xqcm-7p74-m69m

Опубликовано: 15 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 8.1

Описание

The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'restrict-file-access' page. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'restrict-file-access' page. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

EPSS

Процентиль: 26%
0.00088
Низкий

8.1 High

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8.1
nvd
2 месяца назад

The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'restrict-file-access' page. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

EPSS

Процентиль: 26%
0.00088
Низкий

8.1 High

CVSS3

Дефекты

CWE-352