WordPress Upload Files Anywhere Vulnerability (High) – CVE-2025-69380

WordPress Upload Files Anywhere Vulnerability (High) – CVE-2025-69380

by | Feb 17, 2026 | Plugins

Attack Vectors

The WordPress Upload Files Anywhere plugin (slug: wp-upload-files-anywhere) is affected by a High-severity vulnerability (CVSS 7.5) identified as CVE-2025-69380. The issue allows unauthenticated attackers to exploit a path traversal weakness to download files from the server.

Because this can be done over the network with no login required (CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), the practical risk is that attackers may target public-facing WordPress sites using this plugin and attempt to retrieve sensitive files directly from the underlying server.

Security Weakness

In all versions of Upload Files Anywhere up to and including 2.8, the plugin is vulnerable to path traversal, enabling attackers to read the contents of arbitrary files on the server. This is a confidentiality-focused vulnerability (high impact to data exposure) rather than one that directly changes site content or availability.

There is no known patch available. From a business-risk standpoint, that means the exposure can persist indefinitely unless you apply compensating controls or remove/replace the affected software. Given the unauthenticated nature and high confidentiality impact, many organizations will treat this as an urgent risk-reduction decision rather than a “wait for an update” situation.

Technical or Business Impacts

Data exposure risk: Attackers may be able to obtain sensitive information stored on the server, potentially including configuration details, credentials, tokens, or other files that facilitate broader compromise. Even if the initial issue is “read-only,” the information retrieved can enable follow-on attacks.

Regulatory and contractual consequences: Unauthorized access to sensitive data can trigger breach notification obligations, compliance findings, customer reporting requirements, and contractual penalties—especially if personal data, payment-related data, or confidential business information is exposed.

Brand and revenue impact: For marketing directors and executives, the most immediate business concern is loss of trust. Public disclosure of data exposure can increase customer churn, reduce conversion rates, disrupt campaigns, and create long-term brand damage that outlasts the technical incident.

Operational disruption: Incident response efforts—log review, forensic work, stakeholder communications, legal review, and potential site remediation—pull time away from growth initiatives. The lack of an available patch increases the likelihood that mitigation will involve operational changes such as plugin removal or replacement.

Recommended action based on available facts: Since no patch is currently known, review the vulnerability details from the source and apply mitigations aligned to your organization’s risk tolerance; it may be best to uninstall the affected plugin and identify a safer replacement. Reference: Wordfence vulnerability record.

Similar Attacks

File read and path traversal issues have repeatedly been used in real-world campaigns to expose sensitive data and enable follow-on compromise. Examples include:

CVE-2021-41773 (Apache HTTP Server path traversal and file disclosure)

CVE-2018-7600 (Drupal “Drupalgeddon 2,” widely exploited to compromise sites)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers