Arbitrary File Update Vulnerability in WP Editor Plugin for WordPress
CVE-2025-3294

7.2HIGH

Key Information:

Vendor
Benjaminprojas
Status
WP Editor
Vendor
CVE Published:
17 April 2025

Summary

The WP Editor plugin for WordPress has a significant vulnerability due to a lack of file path validation in versions up to 1.2.9.1. This flaw allows authenticated attackers with Administrator access to overwrite arbitrary files on the server. If exploited, this weakness could lead to remote code execution if the affected files are writable by the web server. Website administrators are urged to update to the latest version to mitigate this risk.

Affected Version(s)

WP Editor * <= 1.2.9.1

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Quang Huynh Ngoc
.