CVE-2025-11451
BaseFortify
Publication date: 2025-11-11
Last updated on: 2025-11-12
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | amazon_auto_links | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-73 | The product allows user input to control or influence paths or file names that are used in filesystem operations. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Auto Amazon Links β Amazon Associates Affiliate Plugin for WordPress, versions up to and including 5.4.3. It allows unauthenticated attackers to read arbitrary files on the server via the '/wp-json/wp/v2/aal_ajax_unit_loading' REST API endpoint. This means attackers can access sensitive information stored in files on the server without needing to log in.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to access sensitive files on your server without authentication. This could lead to exposure of confidential data, potentially compromising your website's security and privacy.