CVE-2025-11072: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MelAbu WP Download Counter Button
The MelAbu WP Download Counter Button WordPress plugin through 1.8.6.7 does not validate the path of files to be downloaded, which could allow unauthenticated attacker to read/download arbitrary files.
AI Analysis
Technical Summary
CVE-2025-11072 is a path traversal vulnerability classified under CWE-22 found in the MelAbu WP Download Counter Button WordPress plugin versions through 1.8.6.7. The vulnerability arises because the plugin fails to properly validate or sanitize the file paths requested for download, allowing an attacker to manipulate the pathname parameter to access files outside the intended directory. This lack of restriction enables unauthenticated attackers to read arbitrary files on the web server, potentially exposing sensitive configuration files, credentials, or other private data. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3, reflecting a medium severity with a vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, and impact limited to confidentiality loss. No known public exploits have been reported yet, but the flaw represents a significant risk if weaponized. The plugin is used in WordPress environments, which are widely deployed globally, including Europe. The vulnerability's exploitation could lead to data leakage, which may facilitate further attacks or compromise organizational confidentiality.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive files hosted on WordPress servers using the affected plugin. Exposure of configuration files, credentials, or proprietary information could lead to further compromise, including privilege escalation or lateral movement within networks. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitivity of their data. The vulnerability does not directly affect system integrity or availability, but the confidentiality breach could have regulatory and reputational consequences, especially under GDPR requirements. Since the exploit requires no authentication and can be performed remotely, the attack surface is broad. Organizations with public-facing WordPress sites using this plugin are vulnerable, and the impact could be amplified if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
1. Monitor for and apply security patches or updates from the plugin vendor as soon as they become available to fix the path traversal flaw. 2. In the absence of an official patch, consider temporarily disabling or removing the MelAbu WP Download Counter Button plugin to eliminate exposure. 3. Restrict file system permissions on the web server to limit access to sensitive files, ensuring the web server user cannot read files outside intended directories. 4. Implement Web Application Firewalls (WAFs) with rules to detect and block path traversal attempts, such as requests containing '../' sequences or encoded variants. 5. Conduct regular security audits and vulnerability scans on WordPress installations to identify outdated or vulnerable plugins. 6. Employ strict input validation and sanitization practices for any custom code handling file downloads. 7. Educate site administrators on the risks of installing unverified plugins and encourage use of plugins with strong security track records. 8. Maintain comprehensive logging and monitoring to detect suspicious access patterns indicative of exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-11072: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MelAbu WP Download Counter Button
Description
The MelAbu WP Download Counter Button WordPress plugin through 1.8.6.7 does not validate the path of files to be downloaded, which could allow unauthenticated attacker to read/download arbitrary files.
AI-Powered Analysis
Technical Analysis
CVE-2025-11072 is a path traversal vulnerability classified under CWE-22 found in the MelAbu WP Download Counter Button WordPress plugin versions through 1.8.6.7. The vulnerability arises because the plugin fails to properly validate or sanitize the file paths requested for download, allowing an attacker to manipulate the pathname parameter to access files outside the intended directory. This lack of restriction enables unauthenticated attackers to read arbitrary files on the web server, potentially exposing sensitive configuration files, credentials, or other private data. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3, reflecting a medium severity with a vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, and impact limited to confidentiality loss. No known public exploits have been reported yet, but the flaw represents a significant risk if weaponized. The plugin is used in WordPress environments, which are widely deployed globally, including Europe. The vulnerability's exploitation could lead to data leakage, which may facilitate further attacks or compromise organizational confidentiality.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive files hosted on WordPress servers using the affected plugin. Exposure of configuration files, credentials, or proprietary information could lead to further compromise, including privilege escalation or lateral movement within networks. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitivity of their data. The vulnerability does not directly affect system integrity or availability, but the confidentiality breach could have regulatory and reputational consequences, especially under GDPR requirements. Since the exploit requires no authentication and can be performed remotely, the attack surface is broad. Organizations with public-facing WordPress sites using this plugin are vulnerable, and the impact could be amplified if combined with other vulnerabilities or misconfigurations.
Mitigation Recommendations
1. Monitor for and apply security patches or updates from the plugin vendor as soon as they become available to fix the path traversal flaw. 2. In the absence of an official patch, consider temporarily disabling or removing the MelAbu WP Download Counter Button plugin to eliminate exposure. 3. Restrict file system permissions on the web server to limit access to sensitive files, ensuring the web server user cannot read files outside intended directories. 4. Implement Web Application Firewalls (WAFs) with rules to detect and block path traversal attempts, such as requests containing '../' sequences or encoded variants. 5. Conduct regular security audits and vulnerability scans on WordPress installations to identify outdated or vulnerable plugins. 6. Employ strict input validation and sanitization practices for any custom code handling file downloads. 7. Educate site administrators on the risks of installing unverified plugins and encourage use of plugins with strong security track records. 8. Maintain comprehensive logging and monitoring to detect suspicious access patterns indicative of exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-09-26T12:49:05.710Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690aea9b063e7c5f0116da7a
Added to database: 11/5/2025, 6:11:39 AM
Last enriched: 11/12/2025, 8:02:45 AM
Last updated: 12/20/2025, 12:57:40 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalCVE-2025-12820: CWE-862 Missing Authorization in Pure WC Variation Swatches
UnknownCVE-2025-14735: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in nestornoe Amazon affiliate lite Plugin
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.