CVE-2025-7667 – WordPress Restrict File Access CSRF Vulnerability

The following table lists the changes that have been made to the
CVE-2025-7667 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jul. 15, 2025

    Action Type Old Value New Value
    Added Description The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the ‘restrict-file-access’ page. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
    Added CWE CWE-352
    Added Reference https://plugins.trac.wordpress.org/browser/restrict-file-access/trunk/admin/admin.php#L78
    Added Reference https://www.wordfence.com/threat-intel/vulnerabilities/id/e1105717-134b-48cc-960d-f78437c06793?source=cve
Share the Post:

Related Posts