Overview
This report will detail the CVE-2025-8422, a vulnerability in the All-in-One Client Management System plugin for WordPress, developed by Propovoice. This vulnerability allows unauthenticated attackers to read the contents of any file on the server – a serious issue that can lead to system compromise or data leakage. This vulnerability affects all versions of the plugin up to, and including, version 1.7.6.7.
Vulnerability Summary
CVE ID: CVE-2025-8422
Severity: High (CVSS 7.5)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise or data leakage through unauthorized file reading
Affected Products
A new way to communicate
Ameeba Chat is built on encrypted identity, not personal profiles.
Message, call, share files, and coordinate with identities kept separate.
- • Encrypted identity
- • Ameeba Chat authenticates access
- • Aliases and categories
- • End-to-end encrypted chat, calls, and files
- • Secure notes for sensitive information
Private communication, rethought.
Product | Affected Versions
Propovoice: All-in-One Client Management System for WordPress | Up to and including 1.7.6.7
How the Exploit Works
The vulnerability stems from an issue within the send_email() function of the plugin. This function does not properly validate user input, permitting unauthenticated attackers to manipulate a request. This manipulation can result in the function revealing the contents of arbitrary files on the server.
Conceptual Example Code
Below is a conceptual example of how the vulnerability might be exploited. Note that this is a simplified example and may not reflect the exact process an attacker would use.
GET /wp-content/plugins/propovoice/send_email.php?file_path=/etc/passwd HTTP/1.1
Host: target.example.com
In this example, the attacker sends a GET request to the send_email.php file, including a ‘file_path’ parameter that points to “/etc/passwd”, a critical system file. If the server is vulnerable, its response would include the contents of the ‘/etc/passwd’ file.
Mitigation
Users of the Propovoice All-in-One Client Management System plugin for WordPress are advised to apply the vendor patch as soon as possible. If that is not immediately possible, the use of a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can serve as a temporary mitigation strategy by blocking malicious requests.
