CVE-2025-11705
BaseFortify
Publication date: 2025-10-29
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | gotmls | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Anti-Malware Security and Brute-Force Firewall plugin for WordPress up to version 4.23.81. It is an Arbitrary File Read issue caused by a missing capability check combined with information exposure in several GOTMLS_* AJAX actions. This allows authenticated users with Subscriber-level access or higher to read the contents of arbitrary files on the server, potentially exposing sensitive information.
How can this vulnerability impact me? :
An attacker with at least Subscriber-level access can exploit this vulnerability to read arbitrary files on the server. This could lead to exposure of sensitive information stored in those files, which may compromise the security and privacy of the system and its users.