- Description
- The Mayosis Core plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 5.4.1 via the library/wave-audio/peaks/remote_dl.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
- Source
- security@wordfence.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
- security@wordfence.com
- CWE-22
- Hype score
- Not currently trending
🚨 CVE-2025-1565 🔴 HIGH (7.5) 🏢 TeconceTheme - Mayosis Core 🏗️ * 🔗 https://t.co/Jt7RIxvqNd 🔗 https://t.co/de0DGAG7sv #CyberCron #VulnAlert #InfoSec https://t.co/dK9WNS3Npi
@cybercronai
25 Apr 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
�� CVE-2025-1565 - WordPress - HIGH 🚨 🗓️ Date published 2025-04-25 10:15:15 UTC #WordPress #CyberSecurity #InfoSec #Vulnerability #TechNews https://t.co/ymKNxcYTBv
@vulns_space
25 Apr 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes