CVE-2025-11072

5.3 MEDIUM

📋 TL;DR

The MelAbu WP Download Counter Button WordPress plugin through version 1.8.6.7 contains a path traversal vulnerability that allows unauthenticated attackers to read or download arbitrary files from the server. This affects all WordPress sites running the vulnerable plugin version. Attackers can exploit this without any authentication or special privileges.

💻 Affected Systems

Products:
  • MelAbu WP Download Counter Button WordPress Plugin
Versions: through 1.8.6.7
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin active. The vulnerability exists in the file download functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could download sensitive files like wp-config.php containing database credentials, server configuration files, or other sensitive data, potentially leading to full site compromise.

🟠

Likely Case

Attackers will download WordPress configuration files to obtain database credentials and other sensitive information, then use those to gain administrative access or further compromise the site.

🟢

If Mitigated

With proper file permissions and web server restrictions, attackers may only be able to access publicly readable files, limiting the impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit via crafted HTTP requests. Public proof-of-concept code is available in the WPScan reference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.6.8 or later

Vendor Advisory: https://wpscan.com/vulnerability/538117c5-b04c-45fc-a953-6f619fdf7eaf/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'MelAbu WP Download Counter Button'. 4. Click 'Update Now' if update is available. 5. Alternatively, download latest version from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the plugin until patched

wp plugin deactivate melabu-wp-download-counter-button

Restrict file access via .htaccess

linux

Add rules to block direct access to sensitive files

<FilesMatch "^(wp-config\.php|.*\.sql|.*\.env)$">
  Order allow,deny
  Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Remove the plugin entirely if not essential for site functionality
  • Implement web application firewall rules to block path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for MelAbu WP Download Counter Button version 1.8.6.7 or earlier

Check Version:

wp plugin list --name='melabu-wp-download-counter-button' --field=version

Verify Fix Applied:

Verify plugin version is 1.8.6.8 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' or similar path traversal patterns to plugin endpoints
  • Unusual file access patterns from single IP addresses
  • Requests to /wp-content/plugins/melabu-wp-download-counter-button/ with file parameters

Network Indicators:

  • HTTP GET requests with file= parameter containing path traversal sequences
  • Traffic to plugin download endpoints from unauthenticated users

SIEM Query:

source="web_logs" AND (uri_path="*melabu-wp-download-counter-button*" AND (query="*file=*../*" OR query="*file=*..\\*"))

🔗 References

📤 Share & Export