CVE-2025-12041

5.3 MEDIUM

📋 TL;DR

The ERI File Library WordPress plugin up to version 1.1.0 has an authorization bypass vulnerability that allows unauthenticated attackers to download files intended for specific user roles only. This affects all WordPress sites using vulnerable versions of this plugin. Attackers can access restricted files without any authentication.

💻 Affected Systems

Products:
  • ERI File Library WordPress Plugin
Versions: All versions up to and including 1.1.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using vulnerable plugin versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive files containing confidential data, credentials, or proprietary information are exfiltrated by attackers, leading to data breaches, compliance violations, and reputational damage.

🟠

Likely Case

Attackers download files intended for authenticated users, potentially accessing internal documents, media files, or other restricted content stored through the plugin.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized access attempts are detected and blocked, limiting data exposure to minimal or no sensitive files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted AJAX requests to the vulnerable endpoint without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.1.0

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3385895%40eri-file-library&new=3385895%40eri-file-library

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'ERI File Library' and click 'Update Now'. 4. Verify plugin version is updated beyond 1.1.0.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

WordPress

Add code to WordPress theme's functions.php to remove the vulnerable AJAX action handler

add_action('init', function() { remove_action('wp_ajax_erifl_file', 'erifl_file_callback'); remove_action('wp_ajax_nopriv_erifl_file', 'erifl_file_callback'); });

🧯 If You Can't Patch

  • Disable or remove the ERI File Library plugin entirely
  • Implement web application firewall rules to block requests to the vulnerable AJAX endpoint

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for ERI File Library version 1.1.0 or earlier

Check Version:

wp plugin list --name='ERI File Library' --field=version

Verify Fix Applied:

Verify plugin version is updated beyond 1.1.0 and test that unauthenticated requests to /wp-admin/admin-ajax.php?action=erifl_file return proper authorization errors

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200 OK responses to /wp-admin/admin-ajax.php with action=erifl_file from unauthenticated IPs
  • Unusual file download patterns from the plugin's directory

Network Indicators:

  • HTTP POST/GET requests to /wp-admin/admin-ajax.php with action=erifl_file parameter from external IPs without authentication cookies

SIEM Query:

source="web_logs" AND uri="/wp-admin/admin-ajax.php" AND query="*action=erifl_file*" AND NOT user_agent="*WordPress*"

🔗 References

📤 Share & Export