Impact
The BitFire Security WordPress plugin exposes sensitive data in all versions up to 4.5. The plugin creates a bitfire_* directory that stores files such as config.ini and debug.log without access restrictions. This flaw is classified as CWE-200: Exposure of Sensitive Information. Because directory listing can be enabled and the critical index.php file is missing, unauthenticated attackers can read these files and obtain confidential information.
Affected Systems
The vulnerability affects the BitFire Security – Firewall, WAF, Bot/Spam Blocker, Login Security plugin for WordPress by bitslip6. All releases up to version 4.5 are impacted. No single sub‑version information is specified beyond the 4.5 cut‑off.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate risk, and the EPSS score of less than 1% shows a very low probability of exploitation at this time. The vulnerability corresponds to CWE-200: Exposure of Sensitive Information. Attacks would require the target to have directory listing enabled or a missing index.php file in the plugin directory. Because the attack does not require authentication, any user with web access could exploit it if the conditions exist. The vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment
EUVD