VYPR
Medium severity6.5NVD Advisory· Published Oct 29, 2025· Updated Apr 15, 2026

CVE-2025-11705

CVE-2025-11705

Description

The Anti-Malware Security and Brute-Force Firewall plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 4.23.81 due to a missing capability check combined with an information exposure in several GOTMLS_* AJAX actions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Anti-Malware Security and Brute-Force Firewall plugin (≤4.23.81) leaks an internal token through an unauthenticated endpoint, allowing any authenticated user (Subscriber+) to read arbitrary files via AJAX actions.

Vulnerability

Analysis

The Anti-Malware Security and Brute-Force Firewall plugin for WordPress, installed on over 100,000 sites, contains a broken authorization chain in its quarantine system [1]. The plugin exposes several GOTMLS_* AJAX actions that lack proper capability checks. Critically, the public-facing GOTMLS_View_Quarantine endpoint leaks a valid GOTMLS_mt token to any authenticated user, including those with only Subscriber-level access [1].

Exploitation

Scenario

An attacker who has authenticated to the WordPress site (e.g., as a Subscriber) can first obtain the GOTMLS_mt token from the GOTMLS_View_Quarantine endpoint. With this token, they can then invoke the GOTMLS_scan AJAX action, which does not enforce additional permissions, to read arbitrary files on the server [1]. No additional privileges beyond a Subscriber account are required.

Impact

Successful exploitation allows an attacker to read the contents of arbitrary files, including sensitive configuration files such as wp-config.php. This can expose database credentials, salts, and other secrets, leading to full site compromise [1]. The same token can also be reused in other actions like GOTMLS_empty_trash, creating an additional integrity risk to quarantine records [1].

Mitigation

The vulnerability affects all versions up to and including 4.23.81. Users are advised to update the plugin to the latest patched version as soon as it becomes available. No official patch release date has been announced, but a proof-of-concept has been published, increasing the risk of exploitation [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.