The ERI File Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'erifl_file' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to download files restricted to specific user roles.
                
            Metrics
Affected Vendors & Products
Advisories
    No advisories yet.
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Fri, 31 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 31 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The ERI File Library plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'erifl_file' AJAX action in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to download files restricted to specific user roles. | |
| Title | ERI File Library <= 1.1.0 - Missing Authorization to Unauthenticated Protected File Download | |
| Weaknesses | CWE-862 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-10-31T18:43:16.544Z
Reserved: 2025-10-21T18:43:27.936Z
Link: CVE-2025-12041
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-31T18:43:10.499Z
 NVD
                        NVD
                    Status : Received
Published: 2025-10-31T10:15:42.997
Modified: 2025-10-31T10:15:42.997
Link: CVE-2025-12041
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    No data.