๐Ÿ” CVE Alert

CVE-2025-12041

MEDIUM 5.3

ERI File Library <= 1.1.0 - Missing Authorization to Unauthenticated Protected File Download

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

The ERI File Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'erifl_file' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to download files restricted to specific user roles.

CWE CWE-862
Vendor apos37
Product eri file library
Published Oct 31, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for apos37 eri file library

Be the first to know when new medium vulnerabilities affecting apos37 eri file library are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

apos37 / ERI File Library
0 โ‰ค 1.1.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/16e1d37a-4eb7-45dc-8993-a501fb2aaf73?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3385895%40eri-file-library&new=3385895%40eri-file-library

Credits

Athiwat Tiprasaharn