Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 11 Aug 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
File Away Project
File Away Project file Away |
|
| CPEs | cpe:2.3:a:file_away_project:file_away:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
File Away Project
File Away Project file Away |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 20 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The File Away plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers, leveraging the use of a reversible weak algorithm, to read the contents of arbitrary files on the server, which can contain sensitive information. | |
| Title | File Away <= 3.9.9.0.1 - Missing Authorization to Unauthenticated Arbitrary File Read | |
| Weaknesses | CWE-327 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:55:17.856Z
Reserved: 2025-03-19T22:09:08.214Z
Link: CVE-2025-2539
Updated: 2025-03-20T13:18:06.332Z
Status : Modified
Published: 2025-03-20T12:15:14.900
Modified: 2026-04-08T18:24:36.143
Link: CVE-2025-2539
No data.
OpenCVE Enrichment
Updated: 2026-04-21T22:00:26Z