Home

Description

The Elementor plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.30.2 via the Import_Images::import() function due to insufficient controls on the filename specified. This makes it possible for authenticated attackers, with administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

PUBLISHED Reserved 2025-07-23 | Published 2025-08-12 | Updated 2025-08-12 | Assigner Wordfence




MEDIUM: 4.9CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

*
affected

Timeline

2025-07-10:Discovered
2025-07-10:Vendor Notified
2025-08-11:Disclosed

Credits

Michael Mazzolini finder

References

www.wordfence.com/...-b32e-401c-a642-49f7cd2d07bf?source=cve

plugins.trac.wordpress.org/...lasses/class-import-images.php

github.com/...ommit/6af3551ee4213fb4003338743e22f41aa2a09c01

plugins.trac.wordpress.org/...lasses/class-import-images.php

cve.org (CVE-2025-8081)

nvd.nist.gov (CVE-2025-8081)

Download JSON