Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in videowhisper Broadcast Live Video videowhisper-live-streaming-integration allows Path Traversal.This issue affects Broadcast Live Video: from n/a through <= 6.2.
Published: 2025-02-25
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Videowhisper Live Streaming Integration plugin contains a path traversal flaw that may allow an attacker to delete arbitrary files on the server. The flaw arises because the plugin does not limit user‑supplied file paths to the intended directory, permitting traversal sequences such as "..". If an attacker supplies a crafted file path, the plugin’s deletion operation could remove configuration files, logs, or other critical assets, leading to data loss or service disruption. This vulnerability is categorized as CWE‑22.

Affected Systems

Affected systems are WordPress installations that have the Videowhisper Live Streaming Integration plugin version 6.2 or earlier, including any instance of the Broadcast Live Video plugin deployed on a server where the plugin is installed.

Risk and Exploitability

The CVSS score of 8.6 indicates a high severity of the vulnerability. The EPSS score of <1 % suggests that exploitation in the wild is unlikely at present. The plugin is not listed in the CISA KEV catalog. The likely attack vector is inferred to be remote via the plugin’s exposed web interface; an attacker who can send crafted HTTP requests may be able to trigger the deletion. No special hardware or software is required beyond normal web access to the WordPress site, and it is unclear from the description whether authentication is required.

Generated by OpenCVE AI on May 2, 2026 at 09:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Videowhisper Live Streaming Integration plugin to the latest version that removes the path traversal flaw
  • Restrict file permissions so that the web application user cannot delete critical system files
  • Configure a web application firewall or server rules to block requests that contain path traversal patterns such as '..' in file paths

Generated by OpenCVE AI on May 2, 2026 at 09:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-5378 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in videowhisper VideoWhisper Live Streaming Integration allows Path Traversal. This issue affects VideoWhisper Live Streaming Integration: from n/a through 6.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in videowhisper VideoWhisper Live Streaming Integration allows Path Traversal. This issue affects VideoWhisper Live Streaming Integration: from n/a through 6.2. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in videowhisper Broadcast Live Video videowhisper-live-streaming-integration allows Path Traversal.This issue affects Broadcast Live Video: from n/a through <= 6.2.
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Tue, 25 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 25 Feb 2025 14:30:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in videowhisper VideoWhisper Live Streaming Integration allows Path Traversal. This issue affects VideoWhisper Live Streaming Integration: from n/a through 6.2.
Title WordPress VideoWhisper Live Streaming Integration plugin <= 6.2 - Arbitrary File Deletion vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

Videowhisper Videowhisper Live Streaming Integration
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:40.121Z

Reserved: 2025-02-14T06:53:23.367Z

Link: CVE-2025-26752

cve-icon Vulnrichment

Updated: 2025-02-25T19:28:35.690Z

cve-icon NVD

Status : Deferred

Published: 2025-02-25T15:15:23.597

Modified: 2026-04-23T15:25:55.147

Link: CVE-2025-26752

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T09:15:26Z

Weaknesses