Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in helloprint Helloprint helloprint allows Path Traversal.This issue affects Helloprint: from n/a through <= 2.0.7.
Published: 2025-03-03
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Elecronic path traversal flaw (CWE-22) in the Helloprint WordPress plugin allows an attacker to delete any file on the server that the web application can access. This leads to loss of critical data, disruption of site operations, and potential compromise of sensitive information stored on the server.

Affected Systems

The vulnerability affects the Helloprint plugin for WordPress, specifically all installed versions from the initial release through version 2.0.7. No specific build or platform constraints are listed, so any WordPress site running the plugin within this version range is potentially impacted.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity. The EPSS score of less than 1% suggests that the likelihood of exploitation is very low as of this analysis, and the issue is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves exploitation of the plugin’s file deletion functionality, which may require authenticated access or direct interaction with the plugin's control interface. Once executed, an attacker can delete arbitrary files, undermining availability and integrity of the affected WordPress installation.

Generated by OpenCVE AI on May 1, 2026 at 14:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Helloprint plugin to any version later than 2.0.7 that includes the path traversal fix.
  • Restrict file deletion capabilities to administrators only and disable or remove any publicly exposed deletion endpoints.
  • Configure web server access controls (e.g., .htaccess) to deny directory traversal requests to the plugin’s root path.
  • Enable a Web Application Firewall to block suspicious path traversal patterns targeting the plugin.

Generated by OpenCVE AI on May 1, 2026 at 14:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-5611 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Helloprint allows Path Traversal. This issue affects Helloprint: from n/a through 2.0.7.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Helloprint allows Path Traversal. This issue affects Helloprint: from n/a through 2.0.7. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in helloprint Helloprint helloprint allows Path Traversal.This issue affects Helloprint: from n/a through <= 2.0.7.
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Mar 2025 13:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Helloprint allows Path Traversal. This issue affects Helloprint: from n/a through 2.0.7.
Title WordPress Helloprint Plugin <= 2.0.7 - Arbitrary File Deletion vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:37.810Z

Reserved: 2025-02-12T13:58:16.935Z

Link: CVE-2025-26534

cve-icon Vulnrichment

Updated: 2025-03-03T15:49:31.324Z

cve-icon NVD

Status : Deferred

Published: 2025-03-03T14:15:54.757

Modified: 2026-04-23T15:25:45.247

Link: CVE-2025-26534

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T14:30:06Z

Weaknesses