CVE-2025-14633
Unauthorized File Download in F70 Lead Document WordPress Plugin
Publication date: 2025-12-20
Last updated on: 2025-12-20
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | f70_lead_document_download | 1.4.4 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-14633 is a vulnerability in the WordPress plugin 'f70-lead-document-download' (up to version 1.4.4) where the 'file_download' function lacks proper capability checks. This allows unauthenticated attackers to download any file from the WordPress media library by guessing or enumerating attachment IDs. The plugin relies on download keys and file IDs passed via GET parameters, which are sanitized but insufficiently validated, and the database queries are improperly constructed. This leads to unauthorized file downloads and bypass of download limits. [2, 3]
How can this vulnerability impact me? :
This vulnerability can allow attackers to access and download any file stored in the WordPress media library without authentication. This unauthorized access can lead to exposure of sensitive or private documents. Additionally, attackers can bypass download limits, potentially causing data leakage or abuse of server resources. [2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring HTTP requests to the WordPress site for unauthorized access attempts to the file download functionality of the f70-lead-document-download plugin. Specifically, look for GET requests containing the parameters 'fileid' and 'dlkey' targeting the plugin's download endpoint. You can use network monitoring tools or web server logs to identify such requests. For example, using command-line tools: 1. To search web server logs for suspicious download attempts: grep -E 'fileid=.*&dlkey=.*' /path/to/access.log 2. To monitor live HTTP requests for these parameters: tail -f /path/to/access.log | grep -E 'fileid=.*&dlkey=.*' 3. Using curl to test if unauthorized file downloads are possible by guessing attachment IDs: curl -I 'https://yourwordpresssite.com/?fileid=ATTACHMENT_ID&dlkey=ANYVALUE' Replace ATTACHMENT_ID with numeric IDs to check if files can be downloaded without proper authorization. These commands help detect attempts to exploit the vulnerability by enumerating attachment IDs and accessing files without valid download keys or capability checks. [2, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1. Update the f70-lead-document-download plugin to a version that patches this vulnerability if available. 2. If no patch is available, temporarily disable or deactivate the plugin to prevent unauthorized file downloads. 3. Restrict access to the plugin's download endpoints by implementing access controls such as IP whitelisting or requiring authentication. 4. Monitor and audit access logs for suspicious download attempts and block offending IP addresses. 5. Consider applying web application firewall (WAF) rules to block requests with suspicious 'fileid' and 'dlkey' parameters. 6. Review and harden WordPress file permissions and media library access settings to limit exposure. These steps help prevent exploitation by unauthorized users until a secure plugin update is applied. [2, 3]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to download any file from the WordPress media library by bypassing access controls. This unauthorized access to potentially sensitive or personal data could lead to violations of data protection regulations such as GDPR or HIPAA, which require strict controls over access to personal and sensitive information. Therefore, exploitation of this vulnerability may result in non-compliance with these standards due to unauthorized data disclosure. [2, 3]