CVE-2025-2539
HIGH EXPLOITED NUCLEIFile Away <= 3.9.9.0.1 - Missing Authorization to Unauthenticated Arbitrary File Read
Title source: nucleiDescription
The File Away plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ajax() function in all versions up to, and including, 3.9.9.0.1. This makes it possible for unauthenticated attackers, leveraging the use of a reversible weak algorithm, to read the contents of arbitrary files on the server, which can contain sensitive information.
Exploits (7)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/WordPress-CVE-2025-2539-ReadAnyFile.py
nomisec
WORKING POC
4 stars
by verylazytech · infoleak
https://github.com/verylazytech/CVE-2025-2539
nomisec
WORKING POC
by fazaroot · poc
https://github.com/fazaroot/CVE-2025-2539---File-Away-WordPress-Plugin-Arbitrary-File-Read
Nuclei Templates (1)
File Away <= 3.9.9.0.1 - Missing Authorization to Unauthenticated Arbitrary File Read
HIGHVERIFIEDby iamnoooob,rootxharsh,pdresearch
References (5)
Scores
CVSS v3
7.5
EPSS
0.2081
EPSS Percentile
95.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2025-10-12
CWE
CWE-327
Status
published
Products (2)
file_away_project/file_away
< 3.9.9.0.1
thomstark/File Away
< 3.9.9.0.1
Published
Mar 20, 2025
Tracked Since
Feb 18, 2026