Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3861: CWE-863 Incorrect Authorization in buildwps Prevent Direct Access – Protect WordPress Files

0
Medium
VulnerabilityCVE-2025-3861cvecve-2025-3861cwe-863
Published: Fri Apr 25 2025 (04/25/2025, 05:25:07 UTC)
Source: CVE
Vendor/Project: buildwps
Product: Prevent Direct Access – Protect WordPress Files

Description

The Prevent Direct Access – Protect WordPress Files plugin for WordPress is vulnerable to unauthorized access and modification of data| due to a misconfigured capability check on the 'pda_lite_custom_permission_check' function in versions 2.8.6 to 2.8.8.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to access and change the protection status of media.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:56:54 UTC

Technical Analysis

CVE-2025-3861 is an authorization bypass vulnerability identified in the Prevent Direct Access – Protect WordPress Files plugin developed by buildwps, specifically affecting version 2.8.6. The vulnerability arises from an incorrect authorization check in the 'pda_lite_custom_permission_check' function, which is responsible for verifying user capabilities before allowing access or modification of protected media files. Due to this misconfiguration, authenticated users with Contributor-level permissions or higher can circumvent intended restrictions and alter the protection status of media files, potentially exposing sensitive content or changing access controls improperly. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the plugin fails to enforce proper permission checks. The CVSS v3.1 base score is 5.4 (medium severity), reflecting the network attack vector, low attack complexity, and the requirement for privileges but no user interaction. The impact primarily affects confidentiality and integrity, as unauthorized users can access or modify protected media files, but availability remains unaffected. No patches or exploits are currently publicly available, but the vulnerability is recognized by CISA and Wordfence, highlighting its significance in the WordPress ecosystem.

Potential Impact

The vulnerability allows authenticated users with Contributor-level access or higher to bypass authorization controls and modify the protection status of media files. This can lead to unauthorized disclosure of sensitive media content, potentially exposing private or proprietary information. Additionally, attackers could alter media protection settings to make restricted files publicly accessible or remove protections, undermining content security policies. For organizations relying on this plugin to safeguard media assets, this could result in data leakage, reputational damage, and compliance violations, especially where media files contain personally identifiable information or intellectual property. Since Contributors typically have limited privileges, this vulnerability expands their capabilities beyond intended limits, increasing insider threat risks. Although availability is not impacted, the breach of confidentiality and integrity can have significant operational and legal consequences. The vulnerability affects WordPress sites globally that use this plugin version, particularly those with multiple contributors or user roles that include Contributor-level access.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the Prevent Direct Access – Protect WordPress Files plugin to a version where the authorization check is correctly implemented once available. Until a patch is released, administrators should restrict Contributor-level user permissions or temporarily downgrade user roles to prevent exploitation. Implementing strict user role management and auditing Contributor activities can help detect unauthorized changes. Additionally, consider disabling or limiting the plugin’s media protection features if feasible. Employing Web Application Firewalls (WAFs) with custom rules to monitor and block suspicious requests targeting media protection endpoints may reduce risk. Regularly review media file access logs and protection status changes for anomalies. Finally, maintain a robust backup strategy to restore media files if unauthorized modifications occur.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-21T16:25:29.077Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbeff54

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 2/27/2026, 1:56:54 PM

Last updated: 3/25/2026, 11:38:09 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses