The ARI-Adminer plugin for WordPress is vulnerable to authorization bypass due to a lack of file access controls in nearly every file of the plugin in versions up to, and including, 1.1.14. This makes it possible for unauthenticated attackers to call the files directly and perform a wide variety of unauthorized actions such as accessing a site's database and making changes.
References
Configurations
History
23 Dec 2025, 18:05
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:ari-soft:ari_adminer:*:*:*:*:*:wordpress:*:* | |
| First Time |
Ari-soft
Ari-soft ari Adminer |
|
| References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2065317%40ari-adminer&new=2065317%40ari-adminer&sfp_email=&sfph_mail= - Patch | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/67ad04d4-49ef-4bc4-b3b0-f2752566145e?source=cve - Third Party Advisory |
16 Oct 2024, 16:38
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
16 Oct 2024, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-10-16 07:15
Updated : 2025-12-23 18:05
NVD link : CVE-2019-25215
Mitre link : CVE-2019-25215
CVE.ORG link : CVE-2019-25215
JSON object : View
Products Affected
ari-soft
- ari_adminer
CWE
CWE-862
Missing Authorization
