5.3
CVE-2025-22773
- EPSS 0.13%
- Veröffentlicht 15.01.2025 16:15:40
- Zuletzt bearbeitet 15.01.2025 16:15:40
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
Htaccess File Editor <= 1.0.19 - Unauthenticated Information Exposure
Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19.
Mögliche Gegenmaßnahme
Htaccess File Editor – Easily Edit, Backup, Restore .htaccess file: Update to version 1.0.20, or a newer patched version
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Htaccess File Editor – Easily Edit, Backup, Restore .htaccess file
Version
* - 1.0.19
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerWPChill
≫
Produkt
Htaccess File Editor
Default Statusunaffected
Version <=
1.0.19
Version
n/a
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.13% | 0.334 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| audit@patchstack.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory
The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.