CVE-2025-7518
RSFirewall! <= 1.1.42 - Authenticated (Admin+) Arbitrary File Read
CVSS Score
4.9
EPSS Score
0.0%
EPSS Percentile
0th
The RSFirewall! plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.1.42 via the get_local_filename() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
| CWE | CWE-22 |
| Vendor | rsjoomla |
| Product | rsfirewall! |
| Published | Jul 12, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for rsjoomla rsfirewall!
Be the first to know when new medium vulnerabilities affecting rsjoomla rsfirewall! are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
rsjoomla / RSFirewall!
0 โค 1.1.42
References
Credits
Robert Kruczek Kamil Szczurowski