Home

Description

The WP Editor plugin for WordPress is vulnerable to arbitrary file update due to missing file path validation in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to overwrite arbitrary files on the affected site's server which may make remote code execution possible assuming the files can be written to by the web server.

PUBLISHED Reserved 2025-04-04 | Published 2025-04-17 | Updated 2025-04-17 | Assigner Wordfence




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-04-16:Disclosed

Credits

Quang Huynh Ngoc finder

References

www.wordfence.com/...-3753-41b3-8ba6-9fb494e215a8?source=cve

plugins.trac.wordpress.org/...%2Ftrunk&sfp_email=&sfph_mail=

cve.org (CVE-2025-3294)

nvd.nist.gov (CVE-2025-3294)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.