← Voltar para CVEs
CVE-2025-14388
CRITICAL9.8
Descricao
The PhastPress plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read via null byte injection in all versions up to, and including, 3.7. This is due to a discrepancy between the extension validation in `getExtensionForURL()` which operates on URL-decoded paths, and `appendNormalized()` which strips everything after a null byte before constructing the filesystem path. This makes it possible for unauthenticated attackers to read arbitrary files from the webroot, including wp-config.php, by appending a double URL-encoded null byte (%2500) followed by an allowed extension (.txt) to the file path.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado12/23/2025
Ultima modificacao12/23/2025
Fontenvd
Avistamentos honeypot0
Fraquezas (CWE)
CWE-158
Referencias
https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9570(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9597(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9608(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/phastpress/tags/3.6/sdk/phast.php#L9641(security@wordfence.com)
https://plugins.trac.wordpress.org/changeset/3418139(security@wordfence.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.