Vulnerability Description
The File Away plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers, leveraging the use of a reversible weak algorithm, to read the contents of arbitrary files on the server, which can contain sensitive information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| File Away Project | File Away | <= 3.9.9.0.1 |
Related Weaknesses (CWE)
References
- https://github.com/whattheslime/file-away-exploit?tab=readme-ov-file
- https://plugins.trac.wordpress.org/browser/file-away/trunk/lib/cls/class.fileawaProduct
- https://plugins.trac.wordpress.org/browser/file-away/trunk/lib/cls/class.fileawaProduct
- https://wordpress.org/plugins/file-away/#developersProduct
- https://www.wordfence.com/threat-intel/vulnerabilities/id/5b23bd5c-db27-4d63-846Third Party Advisory
FAQ
What is CVE-2025-2539?
CVE-2025-2539 is a vulnerability with a CVSS score of 7.5 (HIGH). The File Away plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax() function in all versions up to, and including, 3.9.9.0.1. This makes it ...
How severe is CVE-2025-2539?
CVE-2025-2539 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-2539?
Check the references section above for vendor advisories and patch information. Affected products include: File Away Project File Away.