CVE-2025-10744
BaseFortify
Publication date: 2025-10-01
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| managefy | backup | * |
| wordpress | wordpress | * |
| managefy | file_manager | * |
| managefy | code_editor | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the File Manager, Code Editor, and Backup by Managefy plugin for WordPress (up to version 1.6.1). It allows unauthenticated attackers to access sensitive information by viewing publicly exposed log files. These log files contain details such as full file paths and backup file locations, which should not be publicly accessible.
How can this vulnerability impact me? :
The vulnerability can lead to sensitive information exposure, allowing attackers to gain knowledge about the file system structure and backup file locations. This information could be used to facilitate further attacks or unauthorized access to the system.