CVE-2025-8422: CWE-73 External Control of File Name or Path in fassionstorage Propovoice: All-in-One Client Management System
The Propovoice: All-in-One Client Management System plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.7.6.7 via the send_email() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
AI Analysis
Technical Summary
CVE-2025-8422 is a high-severity vulnerability affecting the Propovoice: All-in-One Client Management System WordPress plugin developed by fassionstorage. The vulnerability is categorized under CWE-73, which involves external control of file names or paths. Specifically, the flaw exists in the send_email() function of the plugin in all versions up to and including 1.7.6.7. This vulnerability allows unauthenticated attackers to perform arbitrary file read operations on the server hosting the WordPress site. By exploiting this flaw, attackers can read the contents of arbitrary files on the server, potentially exposing sensitive information such as configuration files, credentials, or other private data. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score is 7.5, reflecting a high impact on confidentiality with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may require vendor intervention or manual code review and hardening. The vulnerability's root cause is improper validation or sanitization of file path inputs in the send_email() function, allowing external control over file paths that are read by the system.
Potential Impact
For European organizations using the Propovoice plugin, this vulnerability poses a significant risk to the confidentiality of sensitive data stored on their web servers. Since the exploit allows unauthenticated arbitrary file reads, attackers can potentially access critical files such as database credentials, private keys, or personal data of clients and employees. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and subsequent financial penalties. The impact is particularly severe for organizations in sectors such as finance, healthcare, and legal services that rely on client management systems and handle sensitive personal or financial information. Additionally, the exposure of configuration files could facilitate further attacks, including privilege escalation or lateral movement within the network. The lack of required authentication and user interaction increases the likelihood of automated exploitation attempts, raising the urgency for European entities to address this vulnerability promptly.
Mitigation Recommendations
Given the absence of an official patch at this time, European organizations should implement immediate compensating controls to mitigate risk. These include: 1) Restricting access to the WordPress plugin directory and sensitive files via web server configuration (e.g., using .htaccess rules or equivalent) to prevent unauthorized file reads. 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the send_email() function or unusual file path parameters. 3) Conducting a thorough code review of the send_email() function to identify and sanitize any user-controllable inputs related to file paths, implementing strict validation to prevent directory traversal or arbitrary file access. 4) Monitoring server logs for anomalous access patterns indicative of exploitation attempts. 5) Isolating the WordPress environment and limiting file system permissions to minimize the impact of any successful exploit. 6) Planning for an immediate update or patch deployment once the vendor releases a fix. Additionally, organizations should review their incident response plans to prepare for potential data breach scenarios related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-8422: CWE-73 External Control of File Name or Path in fassionstorage Propovoice: All-in-One Client Management System
Description
The Propovoice: All-in-One Client Management System plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.7.6.7 via the send_email() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
AI-Powered Analysis
Technical Analysis
CVE-2025-8422 is a high-severity vulnerability affecting the Propovoice: All-in-One Client Management System WordPress plugin developed by fassionstorage. The vulnerability is categorized under CWE-73, which involves external control of file names or paths. Specifically, the flaw exists in the send_email() function of the plugin in all versions up to and including 1.7.6.7. This vulnerability allows unauthenticated attackers to perform arbitrary file read operations on the server hosting the WordPress site. By exploiting this flaw, attackers can read the contents of arbitrary files on the server, potentially exposing sensitive information such as configuration files, credentials, or other private data. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score is 7.5, reflecting a high impact on confidentiality with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may require vendor intervention or manual code review and hardening. The vulnerability's root cause is improper validation or sanitization of file path inputs in the send_email() function, allowing external control over file paths that are read by the system.
Potential Impact
For European organizations using the Propovoice plugin, this vulnerability poses a significant risk to the confidentiality of sensitive data stored on their web servers. Since the exploit allows unauthenticated arbitrary file reads, attackers can potentially access critical files such as database credentials, private keys, or personal data of clients and employees. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and subsequent financial penalties. The impact is particularly severe for organizations in sectors such as finance, healthcare, and legal services that rely on client management systems and handle sensitive personal or financial information. Additionally, the exposure of configuration files could facilitate further attacks, including privilege escalation or lateral movement within the network. The lack of required authentication and user interaction increases the likelihood of automated exploitation attempts, raising the urgency for European entities to address this vulnerability promptly.
Mitigation Recommendations
Given the absence of an official patch at this time, European organizations should implement immediate compensating controls to mitigate risk. These include: 1) Restricting access to the WordPress plugin directory and sensitive files via web server configuration (e.g., using .htaccess rules or equivalent) to prevent unauthorized file reads. 2) Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the send_email() function or unusual file path parameters. 3) Conducting a thorough code review of the send_email() function to identify and sanitize any user-controllable inputs related to file paths, implementing strict validation to prevent directory traversal or arbitrary file access. 4) Monitoring server logs for anomalous access patterns indicative of exploitation attempts. 5) Isolating the WordPress environment and limiting file system permissions to minimize the impact of any successful exploit. 6) Planning for an immediate update or patch deployment once the vendor releases a fix. Additionally, organizations should review their incident response plans to prepare for potential data breach scenarios related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-31T15:00:11.187Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c27a21e1c560fa9d94d442
Added to database: 9/11/2025, 7:28:33 AM
Last enriched: 9/11/2025, 7:29:56 AM
Last updated: 9/11/2025, 7:07:37 PM
Views: 3
Related Threats
CVE-2025-10127: CWE-640 in Daikin Security Gateway
HighCVE-2025-9018: CWE-862 Missing Authorization in germanpearls Time Tracker
HighCVE-2025-48041: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP
HighCVE-2025-48040: CWE-400 Uncontrolled Resource Consumption in Erlang OTP
MediumCVE-2025-48039: CWE-770 Allocation of Resources Without Limits or Throttling in Erlang OTP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.