The WP Editor plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to read arbitrary files on the affected site's server which may reveal sensitive information.
References
Configurations
History
09 Jul 2025, 20:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3269832%40wp-editor%2Ftrunk&old=3151053%40wp-editor%2Ftrunk&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/4618c1f4-c0aa-47f5-8c0b-2cb4a021f2e0?source=cve - Third Party Advisory | |
Summary |
|
|
CPE | cpe:2.3:a:benjaminrojas:wp_editor:*:*:*:*:*:wordpress:*:* | |
First Time |
Benjaminrojas wp Editor
Benjaminrojas |
17 Apr 2025, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-17 06:15
Updated : 2025-07-09 20:16
NVD link : CVE-2025-3295
Mitre link : CVE-2025-3295
CVE.ORG link : CVE-2025-3295
JSON object : View
Products Affected
benjaminrojas
- wp_editor
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')