Description
Path Traversal: '.../...//' vulnerability in WPMU DEV - Your All-in-One WordPress Platform Smush Image Compression and Optimization wp-smushit allows Path Traversal.This issue affects Smush Image Compression and Optimization: from n/a through <= 3.17.0.
Published: 2025-11-06
Score: 4.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability allows an attacker to traverse directories through the Smush Image Compression and Optimization plugin, potentially accessing arbitrary files on the server. The flaw lies in how the plugin processes file paths, permitting users to request files outside the intended directory. Creating a clean path with repeated slashes can bypass normal path checks, enabling read access to sensitive files such as configuration or private data. The impact is primarily confidentiality loss, as the attacker could read files that are not supposed to be publicly available.

Affected Systems

The flaw affects the WordPress plugin Smush Image Compression and Optimization provided by WPMU DEV, from its earliest releases up to and including version 3.17.0. No other versions are listed as vulnerable.

Risk and Exploitability

The CVSS score of 4.1 indicates a moderate risk level. The EPSS score is reported as less than 1%, suggesting that the likelihood of exploitation is currently low. The vulnerability is not listed in the CISA KEV catalog, implying it is not widely known to be exploited in the wild. The likely attack vector is through a crafted URL or payload delivered to a user with sufficient privileges to interact with the plugin, potentially allowing remote exploitation. The vulnerability would only be usable if the attacker can reach the plugin endpoint and generate a traversal request.

Generated by OpenCVE AI on April 29, 2026 at 16:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Smush plugin to version 3.18.0 or later, where the path validation has been corrected.
  • If an upgrade is not immediately possible, deactivate or remove the plugin to prevent any traversal attempts.
  • Configure the web server or application layer to deny read access to sensitive directories and files that should not be accessible via the plugin interface.

Generated by OpenCVE AI on April 29, 2026 at 16:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Fri, 07 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wpmudev
Wpmudev smush Image Compression And Optimization
Vendors & Products Wordpress
Wordpress wordpress
Wpmudev
Wpmudev smush Image Compression And Optimization

Thu, 06 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
Description Path Traversal: '.../...//' vulnerability in WPMU DEV - Your All-in-One WordPress Platform Smush Image Compression and Optimization wp-smushit allows Path Traversal.This issue affects Smush Image Compression and Optimization: from n/a through <= 3.17.0.
Title WordPress Smush Image Compression and Optimization plugin <= 3.17.0 - Directory Traversal vulnerability
Weaknesses CWE-35
References

Subscriptions

Wordpress Wordpress
Wpmudev Smush Image Compression And Optimization
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T19:38:18.746Z

Reserved: 2025-01-03T13:15:52.398Z

Link: CVE-2025-22288

cve-icon Vulnrichment

Updated: 2025-11-07T20:31:07.109Z

cve-icon NVD

Status : Deferred

Published: 2025-11-06T16:15:49.647

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-22288

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:30:15Z

Weaknesses