Original Article Text

Click to Toggle View

WordPress security plugin exposes private data to site subscribers. The Anti-Malware Security and Brute-Force Firewall plugin for WordPress, installed on over 100,000 sites, has a vulnerability that allows subscribers to read any file on the server, potentially exposing private information. The plugin provides malware scanning and protection against brute-force attacks, exploitation of known plugin flaws, and against database injection attempts. Identified as CVE-2025-11705, the vulnerability was reported to Wordfence by researcher Dmitrii Ignatyev and affects versions of the plugin 4.23.81 and earlier. The issue stems from missing capability checks in the GOTMLS_ajax_scan() function, which processes AJAX requests using a nonce that attackers could obtain. This oversight allows a low-privileged user, who can invoke the function, to read arbitrary files on the server, including sensitive data such as the wp-config.php configuration file that stores the database name and credentials. With access to the database, an attacker can extract password hashes, users’ emails, posts, and other private data (and keys, salts for secure authentication). Although the severity of the vulnerability is not considered critical, because authentication is needed for exploitation, many websites allow users to subscribe and increase their access to various sections of the site, such as comments. Sites that offer any kind of membership or subscription, allowing users to create accounts, meet the requirement, and are vulnerable to attacks exploiting CVE-2025-11705. Wordfence has reported the issue to the vendor, Eli, along with a validated proof-of-concept exploit, through the WordPress.org Security Team, on October 14. On October 15, the developer released version 4.23.83 of the plugin that addresses CVE-2025-11705 by adding a proper user capability check via a new ‘GOTMLS_kill_invalid_user()’ function. According to WordPress.org stats, roughly 50,000 website administrators have downloaded the latest version since its release, indicating that an equal number of sites are running a vulnerable version of the plugin. Currently, Wordfence has not detected signs of exploitation in the wild, but applying the patch is strongly recommended, as the public disclosure of the issue may draw the attackers' attention. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.

Daily Brief Summary

VULNERABILITIES // WordPress Plugin Flaw Risks Data Exposure for Over 100,000 Sites

A vulnerability in the Anti-Malware Security and Brute-Force Firewall plugin affects over 100,000 WordPress sites, potentially exposing sensitive data to low-privileged users.

The flaw, identified as CVE-2025-11705, allows subscribers to read arbitrary files, including critical configuration files, due to missing capability checks in the plugin's AJAX function.

Researcher Dmitrii Ignatyev reported the vulnerability, which affects plugin versions 4.23.81 and earlier, to Wordfence and the WordPress.org Security Team.

The developer released version 4.23.83 on October 15, implementing a new function to address the issue by ensuring proper user capability validation.

Approximately 50,000 site administrators have updated to the patched version, leaving many sites still vulnerable to potential exploitation.

While no active exploitation has been detected, the public disclosure of the vulnerability increases the risk, making immediate patching crucial.

Organizations using the plugin are advised to update promptly to mitigate potential data breaches and unauthorized access.