First published: Sat Apr 19 2025(Updated: )
The CLEVER - HTML5 Radio Player With History - Shoutcast and Icecast - Elementor Widget Addon plugin for WordPress is vulnerable to arbitrary file read due to insufficient file path validation in the 'history.php' file in all versions up to, and including, 2.4. This makes it possible for unauthenticated attackers to read arbitrary files on the affected site's server, which may contain sensitive information including database credentials. The vulnerability was partially patched in version 2.4.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
CLEVER HTML5 Radio Player With History - Shoutcast and Icecast - Elementor Widget Addon | <=2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3103 is considered a high severity vulnerability due to the potential for arbitrary file read.
To fix CVE-2025-3103, you should upgrade the CLEVER HTML5 Radio Player With History plugin to version 2.5 or later.
CVE-2025-3103 affects all versions of the CLEVER HTML5 Radio Player With History plugin up to and including version 2.4.
Attackers can exploit CVE-2025-3103 to perform arbitrary file reads on the affected system.
No, no authentication is required to exploit CVE-2025-3103, making it accessible to unauthenticated attackers.