First published: Wed Jan 15 2025(Updated: )
Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPChill Htaccess File Editor | <=1.0.19 | |
WordPress Htaccess File Editor | <=1.0.19 |
Update the WordPress Htaccess File Editor wordpress plugin to the latest available version (at least 1.0.20).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22773 is rated as a medium-severity vulnerability due to its potential for exposing sensitive information.
To fix CVE-2025-22773, you should update the WPChill Htaccess File Editor plugin to a version later than 1.0.19.
CVE-2025-22773 affects WPChill Htaccess File Editor and WordPress Htaccess File Editor versions up to 1.0.19.
CVE-2025-22773 allows exploitation of incorrectly configured access control security levels, leading to sensitive information exposure.
The vendor for the affected software related to CVE-2025-22773 is WPChill.