Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7518: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in rsjoomla RSFirewall!

0
Medium
VulnerabilityCVE-2025-7518cvecve-2025-7518cwe-22
Published: Sat Jul 12 2025 (07/12/2025, 09:24:28 UTC)
Source: CVE Database V5
Vendor/Project: rsjoomla
Product: RSFirewall!

Description

The RSFirewall! plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.1.42 via the get_local_filename() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:18:08 UTC

Technical Analysis

CVE-2025-7518 is a path traversal vulnerability classified under CWE-22, found in the RSFirewall! plugin for WordPress, affecting all versions up to and including 1.1.42. The vulnerability arises from improper limitation of pathname inputs in the get_local_filename() function, which fails to adequately sanitize or restrict file path parameters. This flaw enables authenticated attackers with Administrator-level access or higher to manipulate file path inputs to access arbitrary files on the server filesystem outside the intended directory scope. Such files may include sensitive configuration files, credentials, or other private data, leading to confidentiality breaches. The vulnerability requires authentication with elevated privileges, does not require user interaction, and does not impact system integrity or availability. The CVSS v3.1 base score is 4.9, reflecting a medium severity level due to the high privilege requirement and network attack vector. No public exploits have been reported yet, but the vulnerability poses a risk to organizations relying on RSFirewall! for WordPress security. The lack of a patch link indicates that a fix may not yet be available, emphasizing the need for immediate mitigation steps.

Potential Impact

The primary impact of CVE-2025-7518 is unauthorized disclosure of sensitive information stored on the affected server. Attackers with Administrator-level access can leverage this vulnerability to read arbitrary files, potentially exposing credentials, configuration files, private keys, or other critical data. This breach of confidentiality can facilitate further attacks, including privilege escalation, lateral movement, or data exfiltration. Although integrity and availability are not directly affected, the exposure of sensitive files can undermine organizational security posture and compliance with data protection regulations. Organizations worldwide using RSFirewall! in WordPress environments are at risk, particularly those with high-value or sensitive data. The requirement for high privileges limits exploitation to insiders or compromised administrator accounts, but the risk remains significant given the potential data exposure.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the use of RSFirewall! plugin versions up to 1.1.42. Until an official patch is released, administrators should restrict access to the WordPress admin panel to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise. Additionally, monitoring and logging access to sensitive files and the plugin’s functions can help detect exploitation attempts. Implementing web application firewalls (WAFs) with custom rules to detect and block path traversal patterns targeting the get_local_filename() function parameters can provide temporary protection. Regular backups and segmentation of sensitive data on the server can limit exposure. Once a patch is available, prompt application of the update is critical. Finally, reviewing and minimizing the number of users with Administrator privileges reduces the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-11T21:09:28.884Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68722b5aa83201eaacb3aa66

Added to database: 7/12/2025, 9:31:06 AM

Last enriched: 2/26/2026, 4:18:08 PM

Last updated: 3/22/2026, 7:03:16 PM

Views: 144

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses