Vulnerabilities and security researches forrestrict-file-access restrict-file-access
Direction: ascendingJun 15, 2025
Restrict File Access # CVE-2025-6070
- CVE, Research URL
- Home page URL
- Application
- Date
- Jun 14, 2025
- Research Description
- The Restrict File Access plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1.2 via the output() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
- Affected versions
-
max 1.1.2.
- Status
-
vulnerable
Jul 15, 2025
Restrict File Access # CVE-2025-7667
- CVE, Research URL
- Home page URL
- Application
- Date
- Jul 15, 2025
- Research Description
- The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'restrict-file-access' page. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
- Affected versions
-
max 1.1.2.
- Status
-
vulnerable