Vulnerability Description
The Zombify plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5. This is due to insufficient input validation in the zf_get_file_by_url function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read arbitrary files on the server, including sensitive system files like /etc/passwd, via a forged request. It's worth noting that successfully exploiting this vulnerability relies on a race condition as the file generated will be deleted immediately.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://themeforest.net/item/boombox-viral-buzz-wordpress-theme/16596434
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ef9010e3-f060-4bef-b62
FAQ
What is CVE-2025-8385?
CVE-2025-8385 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The Zombify plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5. This is due to insufficient input validation in the zf_get_file_by_url function. This make...
How severe is CVE-2025-8385?
CVE-2025-8385 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-8385?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.