HIGHCVE-2025-54021CVSS 7.5

Plugin WordPress Simple File List <= 6.1.14 - Vulnerabilidade de Download Arbitrário de Arquivos

Plataforma

wordpress

Componente

simple-file-list

Corrigido em

6.1.15

AI Confidence: highNVDEPSS 0.1%Revisado: mai. de 2026
Traduzindo para o seu idioma…

CVE-2025-54021 describes an Arbitrary File Access vulnerability within the Simple File List WordPress plugin. This vulnerability allows attackers to potentially read sensitive files on the server due to improper input validation. Versions of Simple File List between 0.0.0 and 6.1.14 are affected. A fix is available in version 6.1.15.

WordPress

Detecte esta CVE no seu projeto

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.

Impacto e Cenários de Ataquetraduzindo…

The vulnerability stems from a lack of proper input sanitization, allowing attackers to manipulate file paths and access files outside the intended directory. An attacker could leverage this to read configuration files, database credentials, or other sensitive data stored on the server. Successful exploitation could lead to data breaches, compromise of the WordPress installation, and potentially even remote code execution if sensitive files contain executable code or credentials for other systems. The impact is amplified in shared hosting environments where multiple websites share the same server resources.

Contexto de Exploraçãotraduzindo…

CVE-2025-54021 was published on 2025-08-20. There are currently no known public exploits or active campaigns targeting this vulnerability. It is not listed on the CISA KEV catalog at the time of writing. The vulnerability's simplicity suggests a moderate likelihood of exploitation if a suitable exploit is developed and disseminated.

Quem Está em Riscotraduzindo…

WordPress websites utilizing the Simple File List plugin, particularly those running older versions (0.0.0–6.1.14), are at risk. Shared hosting environments are especially vulnerable as they often have limited control over server configurations and file permissions. Sites with sensitive data stored on the server, such as database credentials or configuration files, face a higher potential impact.

Passos de Detecçãotraduzindo…

• wordpress / composer / npm:

grep -r "../" /var/www/html/wp-content/plugins/simple-file-list/

• generic web:

curl -I http://your-wordpress-site.com/wp-content/plugins/simple-file-list/../../../../etc/passwd

Linha do Tempo do Ataque

  1. Disclosure

    disclosure

Inteligência de Ameaças

Status do Exploit

Prova de ConceitoDesconhecido
CISA KEVNO
Exposição na InternetAlta

EPSS

0.08% (percentil 23%)

CISA SSVC

Exploraçãonone
Automatizávelyes
Impacto Técnicopartial

Vetor CVSS

INTELIGÊNCIA DE AMEAÇAS· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N7.5HIGHAttack VectorNetworkComo o atacante alcança o alvoAttack ComplexityLowCondições necessárias para explorarPrivileges RequiredNoneNível de autenticação necessárioUser InteractionNoneSe a vítima precisa tomar uma açãoScopeUnchangedImpacto além do componente afetadoConfidentialityHighRisco de exposição de dados sensíveisIntegrityNoneRisco de modificação não autorizada de dadosAvailabilityNoneRisco de interrupção de serviçonextguardhq.com · Pontuação Base CVSS v3.1
O que significam essas métricas?
Attack Vector
Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
Attack Complexity
Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
Privileges Required
Nenhum — sem autenticação necessária para explorar.
User Interaction
Nenhuma — ataque automático e silencioso. A vítima não faz nada.
Scope
Inalterado — impacto limitado ao componente vulnerável.
Confidentiality
Alto — perda total de confidencialidade. O atacante pode ler todos os dados.
Integrity
Nenhum — sem impacto na integridade.
Availability
Nenhum — sem impacto na disponibilidade.

Software Afetado

Componentesimple-file-list
FornecedorMitchell Bennis
Faixa afetadaCorrigido em
0.0.0 – 6.1.146.1.15

Informações do pacote

Instalações ativas
5KNicho
Avaliação do plugin
4.3
Requer WordPress
5.0+
Compatível até
6.9.4
Requer PHP
7.4+

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Reservado
  2. Publicada
  3. Modificada
  4. EPSS atualizado

Mitigação e Soluções Alternativastraduzindo…

The primary mitigation is to immediately upgrade Simple File List to version 6.1.15 or later. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests containing path traversal sequences (e.g., ../). Additionally, restrict file permissions on sensitive files and directories to prevent unauthorized access. Regularly review WordPress plugin installations and remove any unused or outdated plugins to reduce the attack surface. After upgrading, confirm the vulnerability is resolved by attempting to access a file outside the intended directory via the plugin’s file listing functionality; access should be denied.

Como corrigirtraduzindo…

Actualice el plugin Simple File List a la última versión disponible para solucionar la vulnerabilidad de recorrido de directorio.  Verifique las actualizaciones disponibles en el panel de administración de WordPress o a través del repositorio de plugins de WordPress.  Asegúrese de realizar una copia de seguridad de su sitio web antes de actualizar cualquier plugin.

Boletim de Segurança CVE

Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.

Perguntas frequentestraduzindo…

What is CVE-2025-54021 — Arbitrary File Access in Simple File List?

CVE-2025-54021 is a HIGH severity vulnerability in Simple File List allowing attackers to read arbitrary files on the server due to improper input validation. It affects versions 0.0.0–6.1.14.

Am I affected by CVE-2025-54021 in Simple File List?

You are affected if your WordPress site uses Simple File List version 0.0.0 through 6.1.14. Check your plugin versions and upgrade immediately if vulnerable.

How do I fix CVE-2025-54021 in Simple File List?

Upgrade Simple File List to version 6.1.15 or later. As a temporary workaround, implement a WAF rule to block path traversal attempts.

Is CVE-2025-54021 being actively exploited?

As of 2025-08-20, there are no confirmed reports of active exploitation, but the vulnerability's simplicity makes it a potential target.

Where can I find the official Simple File List advisory for CVE-2025-54021?

Refer to the Simple File List project's website or WordPress plugin repository for the official advisory and release notes.

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.