Description
The Simple CSV Table plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.0.1 via the `href` parameter in the `[csv]` shortcode. This is due to insufficient path validation before concatenating user-supplied input to a base directory path. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information such as database credentials and authentication keys.
Published: 2025-12-12
Score: 6.5 Medium
EPSS: 2.0% Low
KEV: No
Impact: Arbitrary file read via directory traversal for authenticated Contributor+ users
Action: Immediate Patch
AI Analysis

Impact

The Simple CSV Table plugin for WordPress contains a directory traversal flaw in the href parameter of the [csv] shortcode. The lack of proper path validation allows an authenticated user with Contributor-level access or higher to read any file on the server whose path can be formulated, potentially exposing database credentials or authentication keys. The weakness is a classic path traversal attack (CWE‑22).

Affected Systems

All users of the iworks Simple CSV Table plugin running version 1.0.1 or earlier are affected. No specific operating system or WordPress version is singled out, but any site that has installed the vulnerable plugin and has Contributor or higher roles is at risk.

Risk and Exploitability

The CVSS score of 6.5 classifies the vulnerability as moderately severe. The EPSS score of 2% indicates that exploitation has been observed at a low but non-zero frequency. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access; therefore attackers need to first compromise or abuse a Contributor+ account. Once authenticated, they can construct a malicious href to read arbitrary files. The attack chain is straightforward and does not rely on additional environmental conditions beyond normal plugin usage.

Generated by OpenCVE AI on April 21, 2026 at 17:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Simple CSV Table plugin to a version that removes the directory traversal issue (or apply a vendor patch if released).
  • If an upgrade is not immediately possible, consider disabling or uninstalling the plugin to eliminate the attack surface.
  • Reevaluate user roles and restrict Contributor-level accounts to the minimum permissions required, or remove the Contributor role altogether if it is not needed.

Generated by OpenCVE AI on April 21, 2026 at 17:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Simple CSV Table plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.0.1 via the `href` parameter in the `[csv]` shortcode. This is due to insufficient path validation before concatenating user-supplied input to a base directory path. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information such as database credentials and authentication keys.
Title Simple CSV Table <= 1.0.1 - Directory Traversal to Authenticated (Contributor+) Arbitrary File Read
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:52:12.199Z

Reserved: 2025-11-10T16:42:32.877Z

Link: CVE-2025-12960

cve-icon Vulnrichment

Updated: 2025-12-12T20:46:34.313Z

cve-icon NVD

Status : Deferred

Published: 2025-12-12T09:15:49.627

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12960

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T17:30:37Z

Weaknesses