CVE-2025-7518: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in rsjoomla RSFirewall!
The RSFirewall! plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.1.42 via the get_local_filename() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
AI Analysis
Technical Summary
CVE-2025-7518 is a path traversal vulnerability classified under CWE-22, found in the RSFirewall! plugin for WordPress, affecting all versions up to and including 1.1.42. The vulnerability arises from improper limitation of pathname inputs in the get_local_filename() function, which fails to adequately sanitize or restrict file path parameters. This flaw enables authenticated attackers with Administrator-level access or higher to manipulate file path inputs to access arbitrary files on the server filesystem outside the intended directory scope. Such files may include sensitive configuration files, credentials, or other private data, leading to confidentiality breaches. The vulnerability requires authentication with elevated privileges, does not require user interaction, and does not impact system integrity or availability. The CVSS v3.1 base score is 4.9, reflecting a medium severity level due to the high privilege requirement and network attack vector. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on RSFirewall! for WordPress security. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for immediate mitigation steps.
Potential Impact
The primary impact of CVE-2025-7518 is unauthorized disclosure of sensitive information stored on the affected server. Attackers with Administrator-level access can leverage this vulnerability to read arbitrary files, potentially exposing credentials, configuration files, private keys, or other critical data. This breach of confidentiality can facilitate further attacks, including privilege escalation, lateral movement, or data exfiltration. Although integrity and availability are not directly affected, the exposure of sensitive files can undermine organizational security posture and compliance with data protection regulations. Organizations worldwide using RSFirewall! in WordPress environments are at risk, particularly those with high-value or sensitive data. The requirement for high privileges limits exploitation to insiders or compromised administrator accounts, but the risk remains significant given the potential data exposure.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the use of RSFirewall! plugin versions up to 1.1.42. Until an official patch is released, administrators should restrict access to the WordPress admin panel to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise. Additionally, monitoring and logging access to sensitive files and the plugin’s functions can help detect exploitation attempts. Implementing web application firewalls (WAFs) with custom rules to detect and block path traversal patterns targeting the get_local_filename() function parameters can provide temporary protection. Regular backups and segmentation of sensitive data on the server can limit exposure. Once a patch is available, prompt application of the update is critical. Finally, reviewing and minimizing the number of users with Administrator privileges reduces the attack surface.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Netherlands, Japan, Italy, Spain
CVE-2025-7518: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in rsjoomla RSFirewall!
Description
The RSFirewall! plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.1.42 via the get_local_filename() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-7518 is a path traversal vulnerability classified under CWE-22, found in the RSFirewall! plugin for WordPress, affecting all versions up to and including 1.1.42. The vulnerability arises from improper limitation of pathname inputs in the get_local_filename() function, which fails to adequately sanitize or restrict file path parameters. This flaw enables authenticated attackers with Administrator-level access or higher to manipulate file path inputs to access arbitrary files on the server filesystem outside the intended directory scope. Such files may include sensitive configuration files, credentials, or other private data, leading to confidentiality breaches. The vulnerability requires authentication with elevated privileges, does not require user interaction, and does not impact system integrity or availability. The CVSS v3.1 base score is 4.9, reflecting a medium severity level due to the high privilege requirement and network attack vector. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on RSFirewall! for WordPress security. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for immediate mitigation steps.
Potential Impact
The primary impact of CVE-2025-7518 is unauthorized disclosure of sensitive information stored on the affected server. Attackers with Administrator-level access can leverage this vulnerability to read arbitrary files, potentially exposing credentials, configuration files, private keys, or other critical data. This breach of confidentiality can facilitate further attacks, including privilege escalation, lateral movement, or data exfiltration. Although integrity and availability are not directly affected, the exposure of sensitive files can undermine organizational security posture and compliance with data protection regulations. Organizations worldwide using RSFirewall! in WordPress environments are at risk, particularly those with high-value or sensitive data. The requirement for high privileges limits exploitation to insiders or compromised administrator accounts, but the risk remains significant given the potential data exposure.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the use of RSFirewall! plugin versions up to 1.1.42. Until an official patch is released, administrators should restrict access to the WordPress admin panel to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise. Additionally, monitoring and logging access to sensitive files and the plugin’s functions can help detect exploitation attempts. Implementing web application firewalls (WAFs) with custom rules to detect and block path traversal patterns targeting the get_local_filename() function parameters can provide temporary protection. Regular backups and segmentation of sensitive data on the server can limit exposure. Once a patch is available, prompt application of the update is critical. Finally, reviewing and minimizing the number of users with Administrator privileges reduces the attack surface.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-11T21:09:28.884Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68722b5aa83201eaacb3aa66
Added to database: 7/12/2025, 9:31:06 AM
Last enriched: 2/26/2026, 4:18:08 PM
Last updated: 3/22/2026, 7:03:16 PM
Views: 144
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.