From 5e57ebb3d4d2d2598bd49dcc0dd2c7542be15dd4 Mon Sep 17 00:00:00 2001 From: Sandeep Kadam Date: Tue, 15 Jul 2025 13:44:20 +0100 Subject: [PATCH] Improve GHSA-xqcm-7p74-m69m --- .../GHSA-xqcm-7p74-m69m.json | 29 +++++++++++++++---- 1 file changed, 23 insertions(+), 6 deletions(-) diff --git a/advisories/unreviewed/2025/07/GHSA-xqcm-7p74-m69m/GHSA-xqcm-7p74-m69m.json b/advisories/unreviewed/2025/07/GHSA-xqcm-7p74-m69m/GHSA-xqcm-7p74-m69m.json index e5260417da260..f3fdc0d6eb934 100644 --- a/advisories/unreviewed/2025/07/GHSA-xqcm-7p74-m69m/GHSA-xqcm-7p74-m69m.json +++ b/advisories/unreviewed/2025/07/GHSA-xqcm-7p74-m69m/GHSA-xqcm-7p74-m69m.json @@ -1,24 +1,41 @@ { "schema_version": "1.4.0", "id": "GHSA-xqcm-7p74-m69m", - "modified": "2025-07-15T12:30:26Z", + "modified": "2025-07-15T12:30:31Z", "published": "2025-07-15T12:30:26Z", "aliases": [ "CVE-2025-7667" ], + "summary": "WordPress Plugin - Restrict File Access plugin for WordPress ", "details": "The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'restrict-file-access' page. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", - "severity": [ + "severity": [], + "affected": [ { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" + "package": { + "ecosystem": "Packagist", + "name": "" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7667" }, + { + "type": "WEB", + "url": "https://en-gb.wordpress.org/plugins/restrict-file-access" + }, { "type": "WEB", "url": "https://plugins.trac.wordpress.org/browser/restrict-file-access/trunk/admin/admin.php#L78" @@ -32,7 +49,7 @@ "cwe_ids": [ "CWE-352" ], - "severity": "HIGH", + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-07-15T12:15:22Z"