Description
The Shared Files WordPress plugin before 1.7.58 allows users with a role as low as Contributor to download any file on the web server (such as wp-config.php) via a path traversal vector
Published: 2026-03-26
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized File Disclosure
Action: Patch Immediately
AI Analysis

Impact

The Shared Files WordPress plugin prior to version 1.7.58 contains a path traversal vulnerability that allows a user with at least Contributor privileges to download any file stored on the web server. By manipulating the plugin's request parameters an attacker can escape the intended directory and request files such as wp-config.php, revealing sensitive configuration data. This flaw results in unauthorized disclosure of potentially confidential files, compromising the confidentiality of the site and possibly enabling further attacks if configuration details are obtained.

Affected Systems

WordPress installations using the Shared Files plugin version earlier than 1.7.58 are affected. The vendor is unknown and the plugin name is Shared Files. Any WordPress site running this legacy plugin exposes files to contributors or any user with Contributor-level access. No specific version numbers beyond the upper bound 1.7.58 are provided, so all earlier releases are vulnerable.

Risk and Exploitability

The CVSS base score of 6.8 indicates a high severity of remote file disclosure, while the EPSS score of under 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in CISA's KEV catalog. Attackers can exploit the flaw remotely by sending a crafted HTTP request to the plugin's endpoint while authenticated as a Contributor. Once the vulnerability is triggered, they can retrieve arbitrary files, potentially enabling further compromise if sensitive data is accessed.

Generated by OpenCVE AI on March 27, 2026 at 21:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest update of the Shared Files plugin, version 1.7.58 or newer.
  • If an update is not immediately feasible, remove or disable the plugin until a patch is applied.
  • Restrict Contributor role privileges and remove file download capabilities.

Generated by OpenCVE AI on March 27, 2026 at 21:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 29 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
CWE-22
CWE-284

Fri, 27 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22

Fri, 27 Mar 2026 09:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22

Thu, 26 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-200
CWE-22

Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-200
CWE-22

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sharedfilespro
Sharedfilespro shared Files
Wordpress
Wordpress wordpress
Vendors & Products Sharedfilespro
Sharedfilespro shared Files
Wordpress
Wordpress wordpress

Thu, 26 Mar 2026 06:30:00 +0000

Type Values Removed Values Added
Description The Shared Files WordPress plugin before 1.7.58 allows users with a role as low as Contributor to download any file on the web server (such as wp-config.php) via a path traversal vector
Title Shared Files < 1.7.58 - Contributor+ Arbitrary File Download
References

Subscriptions

Sharedfilespro Shared Files
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-03-26T13:35:20.136Z

Reserved: 2026-01-01T13:42:06.702Z

Link: CVE-2025-15433

cve-icon Vulnrichment

Updated: 2026-03-26T13:35:16.512Z

cve-icon NVD

Status : Deferred

Published: 2026-03-26T07:16:19.133

Modified: 2026-04-15T15:05:47.827

Link: CVE-2025-15433

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:28:01Z

Weaknesses