Description
The Media Library Assistant plugin for WordPress is vulnerable to limited file reading in all versions up to, and including, 3.29 via the mla-stream-image.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary ai/eps/pdf/ps files on the server, which can contain sensitive information.
Published: 2025-10-18
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated File Read
Action: Patch
AI Analysis

Impact

The Media Library Assistant plugin for WordPress permits unauthenticated readers to fetch data from the mla-stream-image.php endpoint. This allows an attacker to retrieve the contents of any .ai, .eps, .pdf, or .ps file stored on the server, exposing potentially sensitive information. The vulnerability stems from improper validation of file names (CWE‑73), resulting in a limited read of file contents rather than full file system traversal. The confidentiality of files residing on the host is therefore at risk, though there is no direct impact on integrity or availability. This flaw is limited to readers, so only individuals who can reach the vulnerable URL are affected.

Affected Systems

WordPress sites running the Media Library Assistant plugin by dglingren, versions 3.29 and earlier. The flaw exists in all builds up to and including 3.29, regardless of other plugins or themes.

Risk and Exploitability

The CVSS v3 score of 5.3 indicates a moderate severity. The EPSS score of less than 1 % signals a low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. Attackers would initiate the exploit by sending an unauthenticated HTTP request to mla-stream-image.php with a crafted file path. No privilege escalation or authentication is required, so the risk is confined to the ability to read files of those types stored on the web server. Given the low EPSS score, the overall risk to exposed sites remains moderate, but any sensitive documents stored in the targeted formats could be accessed by an attacker who discovers the CMS over the network.

Generated by OpenCVE AI on April 22, 2026 at 14:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Media Library Assistant 3.30 or newer; the fix is included in that release
  • Configure web server rules (e.g., .htaccess or firewall) to deny external requests to mla-stream-image.php for non‑authenticated users
  • If the plugin is not needed, disable or delete it to eliminate the attack surface

Generated by OpenCVE AI on April 22, 2026 at 14:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Davidlingren
Davidlingren media Library Assistant
Wordpress
Wordpress wordpress
Vendors & Products Davidlingren
Davidlingren media Library Assistant
Wordpress
Wordpress wordpress

Sat, 18 Oct 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Media Library Assistant plugin for WordPress is vulnerable to limited file reading in all versions up to, and including, 3.29 via the mla-stream-image.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary ai/eps/pdf/ps files on the server, which can contain sensitive information.
Title Media Library Assistant <= 3.29 - Unauthenticated Limited File Read
Weaknesses CWE-73
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Davidlingren Media Library Assistant
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:49:14.472Z

Reserved: 2025-10-14T13:25:58.992Z

Link: CVE-2025-11738

cve-icon Vulnrichment

Updated: 2025-10-20T18:58:52.859Z

cve-icon NVD

Status : Deferred

Published: 2025-10-18T06:15:37.123

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11738

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:15:20Z

Weaknesses