Home

Description

The Zombify plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5. This is due to insufficient input validation in the zf_get_file_by_url function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read arbitrary files on the server, including sensitive system files like /etc/passwd, via a forged request. It's worth noting that successfully exploiting this vulnerability relies on a race condition as the file generated will be deleted immediately.

PUBLISHED Reserved 2025-07-30 | Published 2025-10-31 | Updated 2025-10-31 | Assigner Wordfence




MEDIUM: 6.8CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-10-30:Disclosed

Credits

Tonn finder

References

www.wordfence.com/...-f060-4bef-b62b-4a648f5e5577?source=cve

themeforest.net/...ombox-viral-buzz-wordpress-theme/16596434

cve.org (CVE-2025-8385)

nvd.nist.gov (CVE-2025-8385)

Download JSON