CVE-2025-14633
Unknown Unknown - Not Provided
Unauthorized File Download in F70 Lead Document WordPress Plugin

Publication date: 2025-12-20

Last updated on: 2025-12-20

Assigner: Wordfence

Description
The F70 Lead Document Download plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'file_download' function in all versions up to, and including, 1.4.4. This makes it possible for unauthenticated attackers to download any file from the WordPress media library by guessing or enumerating WordPress attachment IDs.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-20
Last Modified
2025-12-20
Generated
2026-05-07
AI Q&A
2025-12-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordpress f70_lead_document_download 1.4.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-14633 is a vulnerability in the WordPress plugin 'f70-lead-document-download' (up to version 1.4.4) where the 'file_download' function lacks proper capability checks. This allows unauthenticated attackers to download any file from the WordPress media library by guessing or enumerating attachment IDs. The plugin relies on download keys and file IDs passed via GET parameters, which are sanitized but insufficiently validated, and the database queries are improperly constructed. This leads to unauthorized file downloads and bypass of download limits. [2, 3]


How can this vulnerability impact me? :

This vulnerability can allow attackers to access and download any file stored in the WordPress media library without authentication. This unauthorized access can lead to exposure of sensitive or private documents. Additionally, attackers can bypass download limits, potentially causing data leakage or abuse of server resources. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring HTTP requests to the WordPress site for unauthorized access attempts to the file download functionality of the f70-lead-document-download plugin. Specifically, look for GET requests containing the parameters 'fileid' and 'dlkey' targeting the plugin's download endpoint. You can use network monitoring tools or web server logs to identify such requests. For example, using command-line tools: 1. To search web server logs for suspicious download attempts: grep -E 'fileid=.*&dlkey=.*' /path/to/access.log 2. To monitor live HTTP requests for these parameters: tail -f /path/to/access.log | grep -E 'fileid=.*&dlkey=.*' 3. Using curl to test if unauthorized file downloads are possible by guessing attachment IDs: curl -I 'https://yourwordpresssite.com/?fileid=ATTACHMENT_ID&dlkey=ANYVALUE' Replace ATTACHMENT_ID with numeric IDs to check if files can be downloaded without proper authorization. These commands help detect attempts to exploit the vulnerability by enumerating attachment IDs and accessing files without valid download keys or capability checks. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1. Update the f70-lead-document-download plugin to a version that patches this vulnerability if available. 2. If no patch is available, temporarily disable or deactivate the plugin to prevent unauthorized file downloads. 3. Restrict access to the plugin's download endpoints by implementing access controls such as IP whitelisting or requiring authentication. 4. Monitor and audit access logs for suspicious download attempts and block offending IP addresses. 5. Consider applying web application firewall (WAF) rules to block requests with suspicious 'fileid' and 'dlkey' parameters. 6. Review and harden WordPress file permissions and media library access settings to limit exposure. These steps help prevent exploitation by unauthorized users until a secure plugin update is applied. [2, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to download any file from the WordPress media library by bypassing access controls. This unauthorized access to potentially sensitive or personal data could lead to violations of data protection regulations such as GDPR or HIPAA, which require strict controls over access to personal and sensitive information. Therefore, exploitation of this vulnerability may result in non-compliance with these standards due to unauthorized data disclosure. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart