[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fU073mFXW8QH6r-NrC1SSCyieBS--wREEg8JOuKnrJXk":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-6722","bitfire-unauthenticated-information-exposure","BitFire \u003C= 4.5 - Unauthenticated Information Exposure","The BitFire Security – Firewall, WAF, Bot\u002FSpam Blocker, Login Security plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.5 via the bitfire_* directory that automatically gets created and stores potentially sensitive files without any access restrictions. This makes it possible for unauthenticated attackers to extract sensitive data from various files like config.ini, debug.log, and more when directory listing is enabled on the server and the ~\u002Fwp-content\u002Fplugins\u002Findex.php file is missing or ignored.","bitfire",null,"\u003C=4.5","4.6","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2025-08-01 00:00:00","2025-08-25 14:05:07",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F72320980-733d-4fe6-9a13-39c476b77298?source=api-prod",25]