Impact
The Post and Page Builder by BoldGrid – Visual Drag and Drop Editor plugin for WordPress contains a Path Traversal flaw in all versions up to and including 1.27.6. The flaw is triggered by the template_via_url() function, allowing an authenticated attacker with at least Contributor-level access to read the contents of arbitrary files located on the server. The vulnerability is a classic directory traversal issue (CWE‑22) and can expose sensitive configuration, credentials or other critical files if the file paths are not properly validated.
Affected Systems
WordPress sites running the BoldGrid Post and Page Builder plugin, specifically version 1.27.6 or any earlier release. The vulnerability impacts users who have contributed privileges or higher within WordPress, and the affected product is listed under the BoldGrid vendor on the WordPress plugin repository.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate risk, while the EPSS score indicates a very low probability of exploitation (<1 %). The vulnerability is not listed in the CISA KEV catalog. An attacker would need valid contributor credentials and would exploit the path traversal via the template_via_url function to read unintended files. The attack vector is therefore authenticated, and the user must have at least Contributor privileges to exploit the flaw.
OpenCVE Enrichment
EUVD