← Volver a CVEs
CVE-2025-14388
CRITICAL9.8
Descripcion
The PhastPress plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read via null byte injection in all versions up to, and including, 3.7. This is due to a discrepancy between the extension validation in `getExtensionForURL()` which operates on URL-decoded paths, and `appendNormalized()` which strips everything after a null byte before constructing the filesystem path. This makes it possible for unauthenticated attackers to read arbitrary files from the webroot, including wp-config.php, by appending a double URL-encoded null byte (%2500) followed by an allowed extension (.txt) to the file path.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado12/23/2025
Ultima modificacion12/23/2025
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-158
Referencias
https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9570(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9597(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9608(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9641(security@wordfence.com)
https://plugins.trac.wordpress.org/changeset/3418139(security@wordfence.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.