CVE-2025-8009
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-24

Last updated on: 2025-07-25

Assigner: Wordfence

Description
The Security Ninja – WordPress Security Plugin & Firewall plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 5.242 via the 'get_file_source' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to extract sensitive data, including the contents of any file on the server.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-24
Last Modified
2025-07-25
Generated
2026-05-07
AI Q&A
2025-07-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
security_ninja wordpress_security_plugin *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-36 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the Security Ninja WordPress plugin allows authenticated users with Administrator-level access or higher to exploit the 'get_file_source' function to read arbitrary files on the server. This means they can extract sensitive data by accessing the contents of any file on the server, beyond intended permissions. The issue arises because the plugin did not properly restrict file access, allowing file path manipulation and unauthorized file reading. [1, 2]


How can this vulnerability impact me? :

This vulnerability can lead to exposure of sensitive server files and data, potentially including configuration files, credentials, or other confidential information stored on the server. Since it requires Administrator-level access, an attacker who already has elevated privileges can further exploit this flaw to gather sensitive information, increasing the risk of data breaches or further attacks on the system. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by using the Security Ninja plugin's Core Scanner module, which scans WordPress core files for modifications, missing files, and unknown files that should not be present. It provides AJAX endpoints to securely view file sources and run scans on demand. Detection involves checking for unauthorized file access attempts and verifying file integrity against official WordPress core file checksums. There are no specific command-line commands provided, but using the plugin's interface to run the Core Scanner and reviewing its reports is the recommended approach. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Security Ninja plugin to the latest version that contains the fix for CVE-2025-8009. The update removes the ability for administrators to view any server file by manually generating hashes, restricts file viewing to core WordPress folders, implements dual validation using hash and nonce tokens, adds time-limited file access tokens, and improves file path validation to prevent directory traversal attacks. Applying this update will significantly strengthen file access controls and prevent exploitation of the arbitrary file read vulnerability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart