πŸ” CVE Alert

CVE-2025-2512

CRITICAL 9.8

File Away <= 3.9.9.0.1 - Missing Authorization to Unauthenticated File Upload via upload Function

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

The File Away plugin for WordPress is vulnerable to arbitrary file uploads due to a missing capability check and missing file type validation in the upload() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

CWE CWE-434
Vendor thomstark
Product file away
Published Mar 19, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for thomstark file away

Be the first to know when new critical vulnerabilities affecting thomstark file away are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

thomstark / File Away
0 ≀ 3.9.9.0.1

References

NVD β†— CVE.org β†— EPSS Data β†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/9a93313d-a5d7-4109-93c5-b2da26e7a486?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/file-away/trunk/lib/cls/class.fileaway_management.php#L1094 wordpress.org: https://wordpress.org/plugins/file-away/#developers github.com: https://github.com/whattheslime/file-away-exploit?tab=readme-ov-file

Credits

SΓ©lim Lanouar