0
CVE-2025-22773
- EPSS 0.14%
- Veröffentlicht 15.01.2025 16:15:40
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
Htaccess File Editor <= 1.0.19 - Unauthenticated Information Exposure
Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WP Chill Htaccess File Editor htaccess-file-editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through <= 1.0.19.
Mögliche Gegenmaßnahme
Htaccess File Editor – Easily Edit, Backup, Restore .htaccess file: Update to version 1.0.20, or a newer patched version
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Htaccess File Editor – Easily Edit, Backup, Restore .htaccess file
Version
*-1.0.19
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerWP Chill
≫
Produkt
Htaccess File Editor
Default Statusunaffected
Version <=
1.0.19
Version
0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.14% | 0.347 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|
CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory
The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.