Impact
The Prevent Direct Access – Protect WordPress Files plugin for WordPress is vulnerable to Sensitive Information Exposure due to insufficient randomness in the generate_unique_string function. This flaw allows unauthenticated attackers to determine the generated file name and thus retrieve protected files.
Affected Systems
Any WordPress installation running Prevent Direct Access – Protect WordPress Files version 2.8.8 or earlier is affected. The vulnerability is present in all legacy releases up to and including 2.8.8. The issue is tied to the plugin’s random file name generator used to protect uploaded files.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate level of risk. The EPSS score of less than 1% signals a very low probability of exploitation at the time of analysis, and the vulnerability is not currently listed in the CISA KEV catalog. Attackers would need to guess or discover the weakly generated file name to exploit the weakness, suggesting that the attack vector is likely remote and unauthenticated.
OpenCVE Enrichment
EUVD