Description
Path Traversal: '.../...//' vulnerability in axelkeller GPX Viewer gpx-viewer allows Path Traversal.This issue affects GPX Viewer: from n/a through <= 2.2.11.
Published: 2025-03-03
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The GPX Viewer WordPress plugin contains a Path Traversal flaw that allows an attacker to read arbitrary files on the server by supplying an input such as ".../...//". The flaw does not enable code execution or denial of service; its primary impact is the disclosure of confidential files that may exist on the host. The weakness is a classic input validation issue (CWE‑22).

Affected Systems

Any WordPress site using the axelkeller GPX Viewer plugin up to and including version 2.2.11 is affected. The plugin is distributed as a WordPress plugin and does not include a higher, patched version in the current data set.

Risk and Exploitability

The CVSS score of 4.9 marks it as a moderate severity issue, while the EPSS score of less than 1% indicates a very low probability of exploitation at this time. It is not listed in the CISA KEV catalog. The most likely attack vector is a remote web request to a vulnerable plugin endpoint, where the attacker crafts a malicious path parameter; successful exploitation simply retrieves the targeted file contents.

Generated by OpenCVE AI on May 2, 2026 at 03:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GPX Viewer to the latest version that includes the fix.
  • If upgrading is not immediately possible, deactivate or uninstall the plugin to eliminate the attack surface.
  • Restrict filesystem permissions for WordPress site directories to prevent unauthorized file reading, ensuring only the web server has the minimal required access.

Generated by OpenCVE AI on May 2, 2026 at 03:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-5603 Path Traversal vulnerability in NotFound GPX Viewer allows Path Traversal. This issue affects GPX Viewer: from n/a through 2.2.11.
History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Path Traversal vulnerability in NotFound GPX Viewer allows Path Traversal. This issue affects GPX Viewer: from n/a through 2.2.11. Path Traversal: '.../...//' vulnerability in axelkeller GPX Viewer gpx-viewer allows Path Traversal.This issue affects GPX Viewer: from n/a through <= 2.2.11.
First Time appeared Axelkeller
Axelkeller gpx Viewer
Weaknesses CWE-22
CPEs cpe:2.3:a:axelkeller:gpx_viewer:*:*:*:*:*:wordpress:*:*
Vendors & Products Axelkeller
Axelkeller gpx Viewer
References

Tue, 04 Mar 2025 03:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Mar 2025 13:45:00 +0000

Type Values Removed Values Added
Description Path Traversal vulnerability in NotFound GPX Viewer allows Path Traversal. This issue affects GPX Viewer: from n/a through 2.2.11.
Title WordPress GPX Viewer plugin <= 2.2.11 - Path Traversal vulnerability
Weaknesses CWE-35
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Axelkeller Gpx Viewer
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:46.784Z

Reserved: 2025-02-21T16:45:10.727Z

Link: CVE-2025-27274

cve-icon Vulnrichment

Updated: 2025-03-03T15:51:12.507Z

cve-icon NVD

Status : Modified

Published: 2025-03-03T14:15:58.960

Modified: 2026-04-23T15:26:16.650

Link: CVE-2025-27274

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T03:45:33Z

Weaknesses