Description
The WP01 plugin for WordPress is vulnerable to Arbitrary File Download in all versions up to, and including, 2.6.2 due to a missing capability check and insufficient restrictions on the make_archive() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information. CVE-2025-30567 is a duplicate of this issue.
Published: 2025-03-15
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Download
Action: Apply Patch
AI Analysis

Impact

The WP01 plugin contains a missing capability verification and unrestricted use of the make_archive function, allowing authenticated users with Subscriber-level access to trigger arbitrary file downloads from the server. This flaw permits the attacker to read file contents that may hold sensitive data, leading to confidentiality compromise. The weakness maps to CWE-862: Permissions Error.

Affected Systems

All installations of the WP01 – Speed, Security, SEO consultant plugin for WordPress, from all vendor releases up to and including version 2.6.2. The flaw exists in plugin files under the wp01 directory on any WordPress site that has not yet upgraded beyond that version.

Risk and Exploitability

The CVSS base score of 6.5 indicates medium severity. The EPSS score of less than 1% reflects a low probability that this vulnerability is actively exploited in the wild. The flaw is not listed in the CISA KEV catalog. Exploitation requires a logged‑in user with at least Subscriber rights; such a user can supply a crafted request to the make_archive endpoint to download any file located on the server’s file system that the web server process can read. This attack does not appear to require additional privileges or a separate vulnerability, and therefore the risk to any compromised site is significant while the likelihood remains low under current public data.

Generated by OpenCVE AI on April 22, 2026 at 01:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WP01 plugin to the latest version (>= 2.6.3) which adds proper capability checks.
  • If an immediate update is not possible, deactivate or uninstall the WP01 plugin to remove the vulnerable code path.
  • Ensure WordPress file permissions restrict web‑server read access to only files necessary for normal operation, limiting potential data exposure from any remaining code.

Generated by OpenCVE AI on April 22, 2026 at 01:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6620 The WP01 plugin for WordPress is vulnerable to Arbitrary File Download in all versions up to, and including, 2.6.2 due to a missing capability check and insufficient restrictions on the make_archive() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information.
History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description The WP01 plugin for WordPress is vulnerable to Arbitrary File Download in all versions up to, and including, 2.6.2 due to a missing capability check and insufficient restrictions on the make_archive() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information. The WP01 plugin for WordPress is vulnerable to Arbitrary File Download in all versions up to, and including, 2.6.2 due to a missing capability check and insufficient restrictions on the make_archive() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information. CVE-2025-30567 is a duplicate of this issue.

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00043}

epss

{'score': 0.00056}


Fri, 28 Mar 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Wp01ru
Wp01ru wp01
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:wp01ru:wp01:*:*:*:*:*:wordpress:*:*
Vendors & Products Wp01ru
Wp01ru wp01

Mon, 17 Mar 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 15 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Description The WP01 plugin for WordPress is vulnerable to Arbitrary File Download in all versions up to, and including, 2.6.2 due to a missing capability check and insufficient restrictions on the make_archive() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download and read the contents of arbitrary files on the server, which can contain sensitive information.
Title WP01 – Speed, Security, SEO consultant <= 2.6.2 - Authenticated (Subscriber+) Arbitrary File Download
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:06:41.018Z

Reserved: 2025-03-12T19:27:07.155Z

Link: CVE-2025-2267

cve-icon Vulnrichment

Updated: 2025-03-17T21:25:24.479Z

cve-icon NVD

Status : Modified

Published: 2025-03-15T04:15:22.443

Modified: 2026-04-08T18:24:34.090

Link: CVE-2025-2267

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T02:00:05Z

Weaknesses