Skip to main content

CVE-2025-8422: CWE-73 External Control of File Name or Path in fassionstorage Propovoice: All-in-One Client Management System

High
VulnerabilityCVE-2025-8422cvecve-2025-8422cwe-73
Published: Thu Sep 11 2025 (09/11/2025, 07:24:52 UTC)
Source: CVE Database V5
Vendor/Project: fassionstorage
Product: Propovoice: All-in-One Client Management System

Description

The Propovoice: All-in-One Client Management System plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.7.6.7 via the send_email() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

AI-Powered Analysis

AILast updated: 09/11/2025, 07:29:56 UTC

Technical Analysis

CVE-2025-8422 is a high-severity vulnerability affecting the Propovoice: All-in-One Client Management System WordPress plugin developed by fassionstorage. The vulnerability is categorized under CWE-73, which involves external control of file names or paths. Specifically, the flaw exists in the send_email() function of the plugin in all versions up to and including 1.7.6.7. This vulnerability allows unauthenticated attackers to perform arbitrary file read operations on the server hosting the WordPress site. By exploiting this flaw, attackers can read the contents of arbitrary files on the server, potentially exposing sensitive information such as configuration files, credentials, or other private data. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score is 7.5, reflecting a high impact on confidentiality with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may require vendor intervention or manual code review and hardening. The vulnerability's root cause is improper validation or sanitization of file path inputs in the send_email() function, allowing external control over file paths that are read by the system.

Potential Impact

For European organizations using the Propovoice plugin, this vulnerability poses a significant risk to the confidentiality of sensitive data stored on their web servers. Since the exploit allows unauthenticated arbitrary file reads, attackers can potentially access critical files such as database credentials, private keys, or personal data of clients and employees. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and subsequent financial penalties. The impact is particularly severe for organizations in sectors such as finance, healthcare, and legal services that rely on client management systems and handle sensitive personal or financial information. Additionally, the exposure of configuration files could facilitate further attacks, including privilege escalation or lateral movement within the network. The lack of required authentication and user interaction increases the likelihood of automated exploitation attempts, raising the urgency for European entities to address this vulnerability promptly.

Mitigation Recommendations

Given the absence of an official patch at this time, European organizations should implement immediate compensating controls to mitigate risk. These include: 1) Restricting access to the WordPress plugin directory and sensitive files via web server configuration (e.g., using .htaccess rules or equivalent) to prevent unauthorized file reads. 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the send_email() function or unusual file path parameters. 3) Conducting a thorough code review of the send_email() function to identify and sanitize any user-controllable inputs related to file paths, implementing strict validation to prevent directory traversal or arbitrary file access. 4) Monitoring server logs for anomalous access patterns indicative of exploitation attempts. 5) Isolating the WordPress environment and limiting file system permissions to minimize the impact of any successful exploit. 6) Planning for an immediate update or patch deployment once the vendor releases a fix. Additionally, organizations should review their incident response plans to prepare for potential data breach scenarios related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-31T15:00:11.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c27a21e1c560fa9d94d442

Added to database: 9/11/2025, 7:28:33 AM

Last enriched: 9/11/2025, 7:29:56 AM

Last updated: 9/11/2025, 7:07:37 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats