CVE-2025-11705
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-29

Last updated on: 2026-04-08

Assigner: Wordfence

Description
The Anti-Malware Security and Brute-Force Firewall plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 4.23.81 due to a missing capability check combined with an information exposure in several GOTMLS_* AJAX actions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-29
Last Modified
2026-04-08
Generated
2026-05-07
AI Q&A
2025-10-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordpress gotmls *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Anti-Malware Security and Brute-Force Firewall plugin for WordPress up to version 4.23.81. It is an Arbitrary File Read issue caused by a missing capability check combined with information exposure in several GOTMLS_* AJAX actions. This allows authenticated users with Subscriber-level access or higher to read the contents of arbitrary files on the server, potentially exposing sensitive information.


How can this vulnerability impact me? :

An attacker with at least Subscriber-level access can exploit this vulnerability to read arbitrary files on the server. This could lead to exposure of sensitive information stored in those files, which may compromise the security and privacy of the system and its users.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart