[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fk2KcN_AfhLjHGbqNVdJ1YcCUFMO4U9aaI97tqHUluJs":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-3295","wp-editor-authenticated-administrator-directory-traversal-to-arbitrary-file-read","WP Editor \u003C= 1.2.9.1 - Authenticated (Administrator+) Directory Traversal to Arbitrary File Read","The WP Editor plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to read arbitrary files on the affected site's server which may reveal sensitive information.","wp-editor",null,"\u003C=1.2.9.1","1.2.9.2","medium",4.9,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2025-04-16 17:11:50","2025-04-17 05:23:21",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F4618c1f4-c0aa-47f5-8c0b-2cb4a021f2e0?source=api-prod",1]