Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-12397 | The Prevent Direct Access – Protect WordPress Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'generate_unique_string' due to insufficient randomness of the generated file name. This makes it possible for unauthenticated attackers to extract sensitive data including files protected by the plugin if the attacker can determine the file name. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 25 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 25 Apr 2025 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Prevent Direct Access – Protect WordPress Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'generate_unique_string' due to insufficient randomness of the generated file name. This makes it possible for unauthenticated attackers to extract sensitive data including files protected by the plugin if the attacker can determine the file name. | |
| Title | Prevent Direct Access – Protect WordPress Files <= 2.8.8 - Unauthenticated Sensitive Information Exposure | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-04-25T15:08:04.350Z
Reserved: 2025-04-24T16:59:44.504Z
Link: CVE-2025-3923
Updated: 2025-04-25T15:07:58.276Z
Status : Awaiting Analysis
Published: 2025-04-25T06:15:46.117
Modified: 2025-04-29T13:52:28.490
Link: CVE-2025-3923
No data.
OpenCVE Enrichment
No data.
EUVD