Description
Path Traversal: '.../...//' vulnerability in Ihor Kit Morkva UA Shipping morkva-ua-shipping allows PHP Local File Inclusion.This issue affects Morkva UA Shipping: from n/a through <= 1.0.18.
Published: 2025-01-27
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a path traversal flaw that allows a malicious actor to include arbitrary local files through the Morkva UA Shipping plugin’s handling of file paths. An attacker can exploit this to read sensitive configuration files, access application logs, or even execute code if writable files can be targeted. The weakness is categorized as CWE-35, indicating that improper validation of file paths permits directory traversal.

Affected Systems

The affected product is the WordPress Morkva UA Shipping plugin, version 1.0.18 and earlier, developed by Ihor Kit. Any installation using these versions of the plugin is susceptible. The vulnerability applies to all WordPress sites that have the plugin active, regardless of the overall WordPress version.

Risk and Exploitability

The CVSS score of 8.1 reflects high severity, while the EPSS score of less than 1% indicates a low predicted exploitation probability at present. The issue is not listed in the CISA KEV catalog. The likely attack vector is through the plugin’s exposed PHP endpoints that accept file paths, allowing remote exploitation by an unauthenticated or authenticated user as determined by plugin configuration. Given the nature of the defect, a successful exploit could lead to disclosure of confidential files or arbitrary code execution if writable files are targeted.

Generated by OpenCVE AI on May 1, 2026 at 18:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Morkva UA Shipping plugin to a version above 1.0.18, or remove the plugin if no newer version is available.
  • Sanitize and validate all file path inputs in the plugin or web application to prevent directory traversal, ensuring only expected files can be accessed.
  • Deploy a web application firewall or set server‑level rules to block excessive or suspicious file‑path requests, and restrict administrative access to trusted IPs.

Generated by OpenCVE AI on May 1, 2026 at 18:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3879 Path Traversal vulnerability in MORKVA Morkva UA Shipping allows PHP Local File Inclusion. This issue affects Morkva UA Shipping: from n/a through 1.0.18.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Path Traversal vulnerability in MORKVA Morkva UA Shipping allows PHP Local File Inclusion. This issue affects Morkva UA Shipping: from n/a through 1.0.18. Path Traversal: '.../...//' vulnerability in Ihor Kit Morkva UA Shipping morkva-ua-shipping allows PHP Local File Inclusion.This issue affects Morkva UA Shipping: from n/a through <= 1.0.18.
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 27 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 27 Jan 2025 14:15:00 +0000

Type Values Removed Values Added
Description Path Traversal vulnerability in MORKVA Morkva UA Shipping allows PHP Local File Inclusion. This issue affects Morkva UA Shipping: from n/a through 1.0.18.
Title WordPress Morkva UA Shipping plugin <= 1.0.18 - Local File Inclusion vulnerability
Weaknesses CWE-35
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:32.066Z

Reserved: 2025-01-23T14:52:14.007Z

Link: CVE-2025-24685

cve-icon Vulnrichment

Updated: 2025-01-27T14:29:21.523Z

cve-icon NVD

Status : Deferred

Published: 2025-01-27T14:15:29.333

Modified: 2026-04-23T15:25:17.053

Link: CVE-2025-24685

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T18:30:05Z

Weaknesses