The PhastPress plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read via null byte injection in all versions up to, and including, 3.7. This is due to a discrepancy between the extension validation in `getExtensionForURL()` which operates on URL-decoded paths, and `appendNormalized()` which strips everything after a null byte before constructing the filesystem path. This makes it possible for unauthenticated attackers to read arbitrary files from the webroot, including wp-config.php, by appending a double URL-encoded null byte (%2500) followed by an allowed extension (.txt) to the file path.
Metrics
Affected Vendors & Products
References
History
Tue, 23 Dec 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The PhastPress plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read via null byte injection in all versions up to, and including, 3.7. This is due to a discrepancy between the extension validation in `getExtensionForURL()` which operates on URL-decoded paths, and `appendNormalized()` which strips everything after a null byte before constructing the filesystem path. This makes it possible for unauthenticated attackers to read arbitrary files from the webroot, including wp-config.php, by appending a double URL-encoded null byte (%2500) followed by an allowed extension (.txt) to the file path. | |
| Title | PhastPress <= 3.7 - Unauthenticated Arbitrary File Read via Null Byte Injection | |
| Weaknesses | CWE-158 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-12-23T09:20:03.420Z
Reserved: 2025-12-09T20:27:24.165Z
Link: CVE-2025-14388
No data.
Status : Received
Published: 2025-12-23T10:15:43.673
Modified: 2025-12-23T10:15:43.673
Link: CVE-2025-14388
No data.
OpenCVE Enrichment
No data.