CVE-2025-7518 PUBLISHED

RSFirewall! <= 1.1.42 - Authenticated (Admin+) Arbitrary File Read

Assigner: Wordfence
Reserved: 11.07.2025 Published: 12.07.2025 Updated: 14.07.2025

The RSFirewall! plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.1.42 via the get_local_filename() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 4.9

Product Status

Vendor rsjoomla
Product RSFirewall!
Versions Default: unaffected
  • affected from * to 1.1.42 (incl.)

Credits

  • Robert Kruczek finder
  • Kamil Szczurowski finder

References

Problem Types

  • CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE