Description
The WP Ghost (Hide My WP Ghost) – Security & Firewall plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 5.4.01 via the showFile function. This makes it possible for unauthenticated attackers to read the contents of specific file types on the server, which can contain sensitive information.
Published: 2025-03-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Limited File Read
Action: Apply Update
AI Analysis

Impact

The vulnerability resides in the showFile function of the Hide My WP Ghost plugin, allowing path traversal. An attacker can supply crafted input to escape the intended directory and read the contents of specific file types on the server. Because the plugin accepts no authentication, any user who can send HTTP requests to the affected endpoint can trigger the read operation. This constitutes an information‑disclosure flaw that could reveal configuration files, credentials, or other sensitive data, thereby compromising confidentiality. The weakness is identified as CWE‑23, a Path Traversal defect that can expose data when untrusted input is used in file operations without proper validation.

Affected Systems

All installations of the Hide My WP Ghost security plugin for WordPress up to and including version 5.4.01 are affected. The plugin is used by site owners to hide paths and block attacks; the path traversal flaw is present in every release of the plugin in this version window. If an organization is running a supported WordPress environment with this plugin, it must assess whether the plugin is present and whether the insecure endpoint is reachable.

Risk and Exploitability

The CVSS score of 7.5 categorizes this as a high‑severity weakness. The EPSS score of 1% indicates that while the vulnerability is known to be exploitable, the probability of an active exploit is low but non‑negligible. It is not listed in the CISA KEV catalog, suggesting it has not yet been widely exploited in the wild. The likely attack path involves an unauthenticated attacker submitting a crafted request to the plugin’s showFile handler, bypassing authentication checks and causing the server to return the requested file contents. Because no privilege escalation is required, any user can achieve this limited read. Organizations should therefore treat this as a serious risk if the plugin remains at an affected version.

Generated by OpenCVE AI on April 21, 2026 at 21:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Hide My WP Ghost plugin to version 5.4.02 or later, which fixes the path traversal flaw.
  • Restrict access to the plugin’s showFile endpoint by configuring the web server (e.g., via .htaccess or the host’s firewall) so that only trusted hosts or the WordPress document root can reach it.
  • If the plugin is not critical for your security posture, consider disabling or removing it entirely until a patch is applied.

Generated by OpenCVE AI on April 21, 2026 at 21:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6427 The WP Ghost (Hide My WP Ghost) – Security & Firewall plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 5.4.01 via the showFile function. This makes it possible for unauthenticated attackers to read the contents of specific file types on the server, which can contain sensitive information.
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00138}

epss

{'score': 0.00174}


Fri, 20 Jun 2025 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Wpplugins
Wpplugins hide My Wp Ghost
CPEs cpe:2.3:a:wpplugins:hide_my_wp_ghost:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpplugins
Wpplugins hide My Wp Ghost

Fri, 14 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Mar 2025 04:45:00 +0000

Type Values Removed Values Added
Description The WP Ghost (Hide My WP Ghost) – Security & Firewall plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 5.4.01 via the showFile function. This makes it possible for unauthenticated attackers to read the contents of specific file types on the server, which can contain sensitive information.
Title WP Ghost <= 5.4.01 - Unauthenticated Limited File Read
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Wpplugins Hide My Wp Ghost
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:33:05.692Z

Reserved: 2025-03-06T15:06:51.356Z

Link: CVE-2025-2056

cve-icon Vulnrichment

Updated: 2025-03-14T13:45:36.584Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-14T05:15:42.523

Modified: 2025-06-20T18:13:13.507

Link: CVE-2025-2056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:00:26Z

Weaknesses