Impact
The File Away WordPress plugin is vulnerable due to a missing capability check on its ajax() function in all releases up to 3.9.9.0.1. This flaw allows unauthenticated users to construct requests that exploit a reversible weak algorithm to read the contents of any file on the server, potentially exposing sensitive data. The weakness corresponds to CWE‑327, a weak cryptographic algorithm issue. The impact is a full read of arbitrary files without authentication, facilitating data exfiltration and possible downstream attacks.
Affected Systems
Affected software is the File Away plugin by thomstark, a WordPress plugin. Versions 3.9.9.0.1 and earlier are impacted; any deployment of the plugin at those versions or lower is at risk. The plugin resides within a WordPress installation and thus influence extends to the web application’s server filesystem.
Risk and Exploitability
The CVSS score of 7.5 classifies the vulnerability as high severity. The EPSS score of 21% indicates a relatively high likelihood that exploitation attempts have occurred or will occur. The vulnerability is not listed in the CISA KEV catalog. Attackers can target the vulnerable AJAX endpoint without authentication, craft a request with the weak algorithm parameters, and retrieve arbitrary files. No special network or user privileges are required beyond the ability to issue HTTP requests to the site.
OpenCVE Enrichment