The Sreamit theme for WordPress is vulnerable to arbitrary file downloads in all versions up to, and including, 4.0.1. This is due to insufficient file validation in the 'st_send_download_file' function. This makes it possible for authenticated attackers, with subscriber-level access and above, to download arbitrary files.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-10393 | The Sreamit theme for WordPress is vulnerable to arbitrary file downloads in all versions up to, and including, 4.0.1. This is due to insufficient file validation in the 'st_send_download_file' function. This makes it possible for authenticated attackers, with subscriber-level access and above, to download arbitrary files. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 08 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Streamit <= 4.0.1 - Authenticated (Subscriber+) Arbitrary File Download | |
| Metrics |
ssvc
|
Tue, 08 Apr 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Sreamit theme for WordPress is vulnerable to arbitrary file downloads in all versions up to, and including, 4.0.1. This is due to insufficient file validation in the 'st_send_download_file' function. This makes it possible for authenticated attackers, with subscriber-level access and above, to download arbitrary files. | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-04-08T15:59:58.926Z
Reserved: 2025-03-19T13:28:10.784Z
Link: CVE-2025-2519
Updated: 2025-04-08T14:20:09.667Z
Status : Awaiting Analysis
Published: 2025-04-08T02:15:19.283
Modified: 2025-04-08T18:13:53.347
Link: CVE-2025-2519
No data.
OpenCVE Enrichment
No data.
EUVD