The Anti-Malware Security and Brute-Force Firewall plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 4.23.81 due to a missing capability check combined with an information exposure in several GOTMLS_* AJAX actions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 29 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Oct 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Anti-malware Security And Brute-force Firewall Project
Anti-malware Security And Brute-force Firewall Project anti-malware Security And Brute-force Firewall
Wordpress
Wordpress wordpress
Vendors & Products Anti-malware Security And Brute-force Firewall Project
Anti-malware Security And Brute-force Firewall Project anti-malware Security And Brute-force Firewall
Wordpress
Wordpress wordpress

Wed, 29 Oct 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Anti-Malware Security and Brute-Force Firewall plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 4.23.81 due to a missing capability check combined with an information exposure in several GOTMLS_* AJAX actions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Title Anti-Malware Security and Brute-Force Firewall <= 4.23.81 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Read
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-10-29T13:43:07.462Z

Reserved: 2025-10-13T19:18:31.121Z

Link: CVE-2025-11705

cve-icon Vulnrichment

Updated: 2025-10-29T13:43:03.125Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-29T05:15:36.817

Modified: 2025-10-30T15:05:32.197

Link: CVE-2025-11705

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-29T10:57:36Z

Weaknesses