Arbitrary File Update Vulnerability in WP Editor Plugin for WordPress
CVE-2025-3294
7.2HIGH
Key Information:
- Vendor
- Benjaminprojas
- Status
- WP Editor
- Vendor
- CVE Published:
- 17 April 2025
Summary
The WP Editor plugin for WordPress has a significant vulnerability due to a lack of file path validation in versions up to 1.2.9.1. This flaw allows authenticated attackers with Administrator access to overwrite arbitrary files on the server. If exploited, this weakness could lead to remote code execution if the affected files are writable by the web server. Website administrators are urged to update to the latest version to mitigate this risk.
Affected Version(s)
WP Editor * <= 1.2.9.1
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Quang Huynh Ngoc