The ERI File Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'erifl_file' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to download files restricted to specific user roles.
Metrics
Affected Vendors & Products
References
History
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apos37
Apos37 eri File Library Wordpress Wordpress wordpress |
|
| Vendors & Products |
Apos37
Apos37 eri File Library Wordpress Wordpress wordpress |
Fri, 31 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The ERI File Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'erifl_file' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to download files restricted to specific user roles. | |
| Title | ERI File Library <= 1.1.0 - Missing Authorization to Unauthenticated Protected File Download | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-10-31T09:27:20.353Z
Updated: 2025-10-31T18:43:16.544Z
Reserved: 2025-10-21T18:43:27.936Z
Link: CVE-2025-12041
Updated: 2025-10-31T18:43:10.499Z
Status : Received
Published: 2025-10-31T10:15:42.997
Modified: 2025-10-31T10:15:42.997
Link: CVE-2025-12041
No data.
ReportizFlow