Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8422: CWE-73 External Control of File Name or Path in fassionstorage Propovoice: All-in-One Client Management System

0
High
VulnerabilityCVE-2025-8422cvecve-2025-8422cwe-73
Published: Thu Sep 11 2025 (09/11/2025, 07:24:52 UTC)
Source: CVE Database V5
Vendor/Project: fassionstorage
Product: Propovoice: All-in-One Client Management System

Description

The Propovoice: All-in-One Client Management System plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.7.6.7 via the send_email() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:07:43 UTC

Technical Analysis

CVE-2025-8422 is an arbitrary file read vulnerability classified under CWE-73 (External Control of File Name or Path) found in the Propovoice: All-in-One Client Management System plugin for WordPress. The vulnerability exists in the send_email() function, which improperly handles file path inputs, allowing unauthenticated attackers to specify arbitrary file paths on the server. This flaw enables attackers to read sensitive files such as configuration files, password stores, or other confidential data residing on the server filesystem. The vulnerability affects all versions up to and including 1.7.6.7. Exploitation requires no authentication or user interaction, making it highly accessible to remote attackers. The vulnerability was publicly disclosed on September 11, 2025, with a CVSS v3.1 base score of 7.5, reflecting its high impact on confidentiality with no impact on integrity or availability. No patches or official fixes have been released at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability poses a significant risk to organizations using this plugin, especially those managing sensitive client data via WordPress. Attackers could leverage this flaw to gather intelligence or escalate further attacks by harvesting sensitive information from the server.

Potential Impact

The primary impact of CVE-2025-8422 is the unauthorized disclosure of sensitive information stored on the server hosting the vulnerable WordPress plugin. This can lead to exposure of credentials, configuration files, or other private data, potentially enabling further attacks such as privilege escalation, lateral movement, or targeted phishing. Since the vulnerability requires no authentication or user interaction, it can be exploited remotely by any attacker with network access to the affected server. Organizations using the Propovoice plugin for client management are at risk of data breaches, which could result in reputational damage, regulatory penalties, and operational disruptions. The scope of impact is limited to servers running the vulnerable plugin versions, but given WordPress's widespread use, the potential attack surface is significant. The lack of integrity or availability impact means the vulnerability does not directly allow data modification or service disruption, but the confidentiality breach alone is critical in environments handling sensitive client information.

Mitigation Recommendations

1. Immediately audit all WordPress installations for the presence of the Propovoice: All-in-One Client Management System plugin and identify versions up to 1.7.6.7. 2. If possible, disable or remove the vulnerable plugin until a security patch or update is released by the vendor. 3. Implement strict file system permissions on the web server to restrict access to sensitive files, minimizing the impact of arbitrary file reads. 4. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the send_email() function or attempts to access arbitrary file paths. 5. Monitor server logs for unusual file access patterns or repeated requests to the vulnerable endpoint. 6. Segregate sensitive data storage from the web server environment to reduce exposure. 7. Stay informed about vendor updates and apply patches promptly once available. 8. Consider using security plugins or tools that can detect and prevent path traversal or arbitrary file read attempts. 9. Conduct regular security assessments and penetration tests focusing on file inclusion and path traversal vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-31T15:00:11.187Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c27a21e1c560fa9d94d442

Added to database: 9/11/2025, 7:28:33 AM

Last enriched: 2/26/2026, 5:07:43 PM

Last updated: 3/25/2026, 4:48:32 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses