Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 01 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Fri, 31 Oct 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Zombify plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.7.5. This is due to insufficient input validation in the zf_get_file_by_url function. This makes it possible for authenticated attackers, with subscriber-level access and above, to read arbitrary files on the server, including sensitive system files like /etc/passwd, via a forged request. It's worth noting that successfully exploiting this vulnerability relies on a race condition as the file generated will be deleted immediately. | |
| Title | Zombify <= 1.7.5 - Authenticated (Subscriber+) Path Traversal to Arbitrary File Read | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:31:58.744Z
Reserved: 2025-07-30T18:45:04.999Z
Link: CVE-2025-8385
Updated: 2025-10-31T17:21:56.215Z
Status : Deferred
Published: 2025-10-31T08:15:36.777
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-8385
No data.
OpenCVE Enrichment
Updated: 2026-04-20T19:15:15Z