CVE-2025-6253
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-12

Last updated on: 2025-08-12

Assigner: Wordfence

Description
The UiCore Elements – Free Elementor widgets and templates plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.3.0 via the prepare_template() function due to a missing capability check and insufficient controls on the filename specified. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-12
Last Modified
2025-08-12
Generated
2026-05-07
AI Q&A
2025-08-12
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
uicore elements 1.3.0
uicore elements 1.3.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the UiCore Elements WordPress plugin (up to version 1.3.0) allows unauthenticated attackers to read arbitrary files on the server via the prepare_template() function. This happens because of a missing capability check and insufficient controls on the filename parameter, enabling attackers to access sensitive file contents without authorization.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized disclosure of sensitive information stored on the server by allowing attackers to read arbitrary files. This can compromise confidential data, potentially leading to further attacks or data breaches.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability can negatively impact compliance with standards like GDPR and HIPAA because it allows unauthorized access to sensitive data, which may include personal or protected health information. Such data exposure violates requirements for data confidentiality and protection under these regulations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by checking the version of the UiCore Elements plugin installed on your WordPress site. Versions up to and including 1.3.0 are vulnerable. To check the plugin version, use the following command on your server: `wp plugin list | grep uicore-elements`. Additionally, monitoring for unusual REST API requests attempting to read arbitrary files may help detect exploitation attempts. However, no specific detection commands for exploit attempts are provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the UiCore Elements plugin to version 1.3.1 or later, as this version contains the security fixes addressing CVE-2025-6253. This update includes stricter controls on REST API requests and fixes to prevent arbitrary file read exploits. If updating is not immediately possible, consider disabling the plugin temporarily to prevent exploitation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart