Description
The ERI File Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'erifl_file' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to download files restricted to specific user roles.
Problem types
Product status
* (semver)
Timeline
| 2025-10-21: | Vendor Notified |
| 2025-10-30: | Disclosed |
Credits
Athiwat Tiprasaharn
References
www.wordfence.com/...-4eb7-45dc-8993-a501fb2aaf73?source=cve
plugins.trac.wordpress.org/...new=3385895%40eri-file-library