CVE-2025-11738

5.3 MEDIUM

📋 TL;DR

The Media Library Assistant WordPress plugin has a vulnerability that allows unauthenticated attackers to read arbitrary AI, EPS, PDF, and PS files on the server. This affects all versions up to and including 3.29. Sensitive information in these file types could be exposed.

💻 Affected Systems

Products:
  • Media Library Assistant WordPress plugin
Versions: All versions up to and including 3.29
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with the vulnerable plugin are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers exfiltrate sensitive documents containing credentials, personal data, or proprietary information, leading to data breaches and compliance violations.

🟠

Likely Case

Attackers scan for and download exposed files containing configuration data, API keys, or other sensitive information that could enable further attacks.

🟢

If Mitigated

With proper file permissions and network controls, attackers can only access publicly readable files, limiting exposure to non-sensitive content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting specific HTTP requests to the mla-stream-image.php file with file path parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.30 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3379044/media-library-assistant

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Media Library Assistant. 4. Click 'Update Now' if available, or manually update to version 3.30+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Temporary file access restriction

all

Block direct access to the vulnerable mla-stream-image.php file via web server configuration

For Apache: Add 'Deny from all' to .htaccess in plugin directory
For Nginx: Add 'location ~ mla-stream-image\.php$ { deny all; }' to site config

🧯 If You Can't Patch

  • Disable the Media Library Assistant plugin immediately
  • Implement strict network access controls to limit exposure to trusted IPs only

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Media Library Assistant version. If version is 3.29 or lower, system is vulnerable.

Check Version:

wp plugin list --name='Media Library Assistant' --field=version

Verify Fix Applied:

Confirm plugin version is 3.30 or higher in WordPress admin panel, then test that mla-stream-image.php no longer serves arbitrary files.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /wp-content/plugins/media-library-assistant/includes/mla-stream-image.php with file path parameters
  • Unusual file access patterns to AI/EPS/PDF/PS files

Network Indicators:

  • Outbound transfers of AI/EPS/PDF/PS files from web server to untrusted IPs
  • Repeated requests to mla-stream-image.php with different file parameters

SIEM Query:

source="web_access_logs" AND uri="/wp-content/plugins/media-library-assistant/includes/mla-stream-image.php" AND (query="*file=*" OR query="*path=*")

🔗 References

📤 Share & Export