CVE-2025-3923: Prevent Direct Access – Protect WordPress Files <= 2.8.8 - Unauthenticated Sensitive Information Exposure

5.3 CVSS

Description

The Prevent Direct Access – Protect WordPress Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'generate_unique_string' due to insufficient randomness of the generated file name. This makes it possible for unauthenticated attackers to extract sensitive data including files protected by the plugin if the attacker can determine the file name.

Classification

CVE ID: CVE-2025-3923

CVSS Base Severity: MEDIUM

CVSS Base Score: 5.3

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem Types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Affected Products

Vendor: buildwps

Product: Prevent Direct Access – Protect WordPress Files

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 14.28% (scored less or equal to compared to others)

EPSS Date: 2025-05-24 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-3923
https://www.wordfence.com/threat-intel/vulnerabilities/id/f648a9ca-a72f-418e-bf1b-ad4ecc27d365?source=cve
https://plugins.svn.wordpress.org/prevent-direct-access/tags/2.8.8/includes/helper.php
https://plugins.trac.wordpress.org/browser/prevent-direct-access/trunk/includes/helper.php#L16

Timeline