First published: Fri Apr 25 2025(Updated: )
The Prevent Direct Access – Protect WordPress Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'generate_unique_string' due to insufficient randomness of the generated file name. This makes it possible for unauthenticated attackers to extract sensitive data including files protected by the plugin if the attacker can determine the file name.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Prevent Direct Access Protect WordPress Files | <=2.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3923 is classified as a medium severity vulnerability due to the potential for sensitive information exposure.
To fix CVE-2025-3923, update the Prevent Direct Access – Protect WordPress Files plugin to version 2.8.9 or later.
CVE-2025-3923 is a Sensitive Information Exposure vulnerability caused by insufficient randomness in generated file names.
CVE-2025-3923 affects all versions of the Prevent Direct Access – Protect WordPress Files plugin up to and including 2.8.8.
Yes, CVE-2025-3923 is exploitable by attackers who can leverage the weak randomness to access sensitive information.