Description
The Jupiter X Core plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 4.8.7 via the inline SVG feature. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Published: 2025-02-01
Score: 6.5 Medium
EPSS: 1.1% Low
KEV: No
Impact: Arbitrary File Read
Action: Patch Now
AI Analysis

Impact

A Directory Traversal flaw exists in the inline SVG component of the Jupiter X Core WordPress plugin, allowing authenticated users with Contributor level or higher to read any file on the server. This vulnerability can expose sensitive configuration files, credentials, or other private data, compromising confidentiality of the site’s system and potentially leading to further compromise if secrets are exposed.

Affected Systems

The issue affects all installations of Jupiter X Core up to and including version 4.8.7. Sites running WordPress with this plugin and with users assigned the Contributor role or higher are impacted. Newer plugin releases are not vulnerable.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate risk, and the EPSS probability of 1% suggests a low likelihood of exploitation in the wild. While the vulnerability is not listed in CISA’s KEV catalog, it can be abused via authenticated access through the inline‑SVG feature. Attackers must first obtain or elevate a Contributor credential and then instantiate the vulnerable module to traverse directories and retrieve arbitrary files.

Generated by OpenCVE AI on April 21, 2026 at 22:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Jupiter X Core to version 4.8.8 or later, where the inline‑SVG traversal issue is fixed.
  • If an immediate update cannot be performed, disable the Inline SVG feature or remove the inline‑svg module from the plugin configuration to stop the traversal vector for Contributor and higher roles.
  • Reduce system exposure by tightening Contributor privileges or revoking Contributor access on the affected WordPress sites until a patch can be applied.

Generated by OpenCVE AI on April 21, 2026 at 22:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-1628 The Jupiter X Core plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 4.8.7 via the inline SVG feature. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00389}

epss

{'score': 0.00425}


Mon, 24 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Artbees
Artbees jupiter X Core
CPEs cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*
Vendors & Products Artbees
Artbees jupiter X Core

Mon, 03 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 01 Feb 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Jupiter X Core plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 4.8.7 via the inline SVG feature. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Title Jupiterx Core <= 4.8.7 - Authenticated (Contributor+) Arbitrary File Read
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Artbees Jupiter X Core
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:40.376Z

Reserved: 2025-01-09T16:58:05.458Z

Link: CVE-2025-0365

cve-icon Vulnrichment

Updated: 2025-02-03T16:07:57.617Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-01T06:15:31.213

Modified: 2025-02-24T15:56:57.453

Link: CVE-2025-0365

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:30:06Z

Weaknesses