Description
The Anti-Malware Security and Brute-Force Firewall plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 4.23.81 due to a missing capability check combined with an information exposure in several GOTMLS_* AJAX actions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Published: 2025-10-29
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Read
Action: Upgrade
AI Analysis

Impact

The Anti‑Malware Security and Brute‑Force Firewall plugin for WordPress contains a missing capability check that allows authenticated users, even at the Subscriber level, to read the contents of arbitrary files on the server. This flaw enables an attacker to view sensitive data such as configuration files, credentials, or other confidential information stored on the host. The weakness is a classic example of an access control failure (CWE‑862).

Affected Systems

All versions of the scheeeli Anti‑Malware Security and Brute‑Force Firewall plugin up to and including 4.23.81 are affected. Users who have installed any of these releases on WordPress sites are vulnerable.

Risk and Exploitability

The CVSS score of 6.5 places this vulnerability in the moderate severity range. With an EPSS score of less than 1% and no presence in the CISA KEV catalog, the likelihood of exploitation is low, yet it remains exploitable for any authenticated Subscriber or higher user. The attack can be carried out by accessing vulnerable GOTMLS_* AJAX endpoints, which expose file contents without authorization checks. Successful exploitation results in information disclosure rather than code execution or denial of service.

Generated by OpenCVE AI on April 21, 2026 at 02:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest release of the Anti‑Malware Security and Brute‑Force Firewall plugin (4.23.82 or later).
  • If an immediate update is infeasible, disable the plugin or block access to the vulnerable GOTMLS_* AJAX actions.
  • Review and restrict file system permissions and user roles so that Subscriber users cannot read sensitive files.

Generated by OpenCVE AI on April 21, 2026 at 02:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
References

Wed, 29 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Oct 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Anti-malware Security And Brute-force Firewall Project
Anti-malware Security And Brute-force Firewall Project anti-malware Security And Brute-force Firewall
Wordpress
Wordpress wordpress
Vendors & Products Anti-malware Security And Brute-force Firewall Project
Anti-malware Security And Brute-force Firewall Project anti-malware Security And Brute-force Firewall
Wordpress
Wordpress wordpress

Wed, 29 Oct 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Anti-Malware Security and Brute-Force Firewall plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 4.23.81 due to a missing capability check combined with an information exposure in several GOTMLS_* AJAX actions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Title Anti-Malware Security and Brute-Force Firewall <= 4.23.81 - Missing Authorization to Authenticated (Subscriber+) Arbitrary File Read
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Anti-malware Security And Brute-force Firewall Project Anti-malware Security And Brute-force Firewall
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:29:16.971Z

Reserved: 2025-10-13T19:18:31.121Z

Link: CVE-2025-11705

cve-icon Vulnrichment

Updated: 2025-10-29T13:43:03.125Z

cve-icon NVD

Status : Deferred

Published: 2025-10-29T05:15:36.817

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11705

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:15:06Z

Weaknesses