The following table lists the changes that have been made to the
CVE-2025-7667 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Jul. 15, 2025
Action Type Old Value New Value Added Description The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the ‘restrict-file-access’ page. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H Added CWE CWE-352 Added Reference https://plugins.trac.wordpress.org/browser/restrict-file-access/trunk/admin/admin.php#L78 Added Reference https://www.wordfence.com/threat-intel/vulnerabilities/id/e1105717-134b-48cc-960d-f78437c06793?source=cve