The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'restrict-file-access' page. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00135}

epss

{'score': 0.00081}


Tue, 15 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00135}


Tue, 15 Jul 2025 11:30:00 +0000

Type Values Removed Values Added
Description The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'restrict-file-access' page. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Restrict File Access <= 1.1.2 - Cross-Site Request Forgery to Arbitrary File Deletion
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-07-15T11:20:04.307Z

Updated: 2025-07-15T13:14:26.317Z

Reserved: 2025-07-14T21:43:01.363Z

Link: CVE-2025-7667

cve-icon Vulnrichment

Updated: 2025-07-15T13:14:21.680Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-15T12:15:22.990

Modified: 2025-07-15T13:14:24.053

Link: CVE-2025-7667

cve-icon Redhat

No data.