Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-2984 Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19.
Fixes

Solution

Update the WordPress Htaccess File Editor wordpress plugin to the latest available version (at least 1.0.20).


Workaround

No workaround given by the vendor.

History

Wed, 15 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Jan 2025 15:30:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19.
Title WordPress Htaccess File Editor <= 1.0.19 - Broken Authentication vulnerability
Weaknesses CWE-538
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2025-01-15T19:17:51.950Z

Reserved: 2025-01-07T21:04:56.181Z

Link: CVE-2025-22773

cve-icon Vulnrichment

Updated: 2025-01-15T19:17:16.583Z

cve-icon NVD

Status : Received

Published: 2025-01-15T16:15:40.027

Modified: 2025-01-15T16:15:40.027

Link: CVE-2025-22773

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T15:26:19Z