Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11451: CWE-73 External Control of File Name or Path in miunosoft Auto Amazon Links – Amazon Associates Affiliate Plugin

0
High
VulnerabilityCVE-2025-11451cvecve-2025-11451cwe-73
Published: Tue Nov 11 2025 (11/11/2025, 03:30:39 UTC)
Source: CVE Database V5
Vendor/Project: miunosoft
Product: Auto Amazon Links – Amazon Associates Affiliate Plugin

Description

The Auto Amazon Links – Amazon Associates Affiliate Plugin plugin for WordPress is vulnerable to arbitrary files reads in all versions up to, and including, 5.4.3 via the '/wp-json/wp/v2/aal_ajax_unit_loading' RST API endpoint. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

AI-Powered Analysis

AILast updated: 11/11/2025, 04:01:06 UTC

Technical Analysis

CVE-2025-11451 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the Auto Amazon Links – Amazon Associates Affiliate Plugin for WordPress. This plugin, widely used to integrate Amazon affiliate links into WordPress sites, contains a flaw in its REST API endpoint '/wp-json/wp/v2/aal_ajax_unit_loading' that allows unauthenticated attackers to perform arbitrary file reads on the hosting server. The vulnerability arises because the plugin fails to properly validate or sanitize user-supplied input controlling file paths, enabling attackers to specify arbitrary file names or paths. Exploiting this vulnerability does not require authentication or user interaction, increasing its risk profile. The impact is primarily on confidentiality, as attackers can access sensitive files such as configuration files, credentials, or other data stored on the server. The vulnerability affects all versions up to and including 5.4.3, with no patch currently available at the time of disclosure. The CVSS v3.1 base score is 7.5, indicating high severity due to network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits have been observed in the wild, the vulnerability's characteristics make it a prime target for attackers seeking to gather sensitive information or prepare for further attacks. The plugin's widespread use in e-commerce and affiliate marketing increases the potential attack surface, especially for sites relying on WordPress in Europe. The vulnerability's disclosure date is November 11, 2025, with the CVE reserved on October 7, 2025. The lack of an immediate patch necessitates interim mitigations to reduce risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data hosted on WordPress sites using the affected plugin. Attackers can leverage this flaw to read configuration files, database credentials, or other sensitive information, potentially leading to further compromise such as data breaches or unauthorized access. E-commerce platforms and affiliate marketers relying on this plugin are particularly vulnerable, as exposure of affiliate credentials or customer data could result in financial loss and reputational damage. The vulnerability's ease of exploitation and lack of authentication requirements mean that attackers can operate remotely and anonymously, increasing the likelihood of automated scanning and exploitation attempts. Organizations in regulated sectors such as finance, healthcare, and retail must be especially vigilant due to compliance requirements around data protection (e.g., GDPR). Additionally, the exposure of internal files could facilitate lateral movement or privilege escalation in compromised environments. The absence of known exploits in the wild currently offers a window for proactive defense, but the high severity score underscores the urgency of mitigation.

Mitigation Recommendations

1. Monitor official channels from the plugin vendor (miunosoft) and WordPress for the release of a security patch addressing CVE-2025-11451 and apply updates immediately upon availability. 2. Until a patch is released, restrict access to the vulnerable REST API endpoint '/wp-json/wp/v2/aal_ajax_unit_loading' by implementing web application firewall (WAF) rules or server-level access controls to block unauthenticated requests targeting this endpoint. 3. Employ strict input validation and sanitization on any custom code interacting with the plugin or REST API to prevent exploitation. 4. Conduct regular security audits and file integrity monitoring on WordPress installations to detect unauthorized file access or changes. 5. Limit the exposure of sensitive files on the server by following the principle of least privilege and ensuring proper file permissions. 6. Use security plugins that can detect and block suspicious REST API activity. 7. Educate site administrators about the risks and signs of exploitation attempts, encouraging prompt incident reporting. 8. Consider isolating critical WordPress instances or running them in hardened environments to reduce the impact of potential breaches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-07T16:53:27.994Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912b12e14bc3e00ba783c9e

Added to database: 11/11/2025, 3:44:46 AM

Last enriched: 11/11/2025, 4:01:06 AM

Last updated: 11/11/2025, 4:49:57 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats