Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in rockgod100 Theme File Duplicator theme-file-duplicator allows Path Traversal.This issue affects Theme File Duplicator: from n/a through <= 1.3.
Published: 2025-04-17
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from an improper limitation of a pathname in the Theme File Duplicator WordPress plugin. The plugin fails to validate or sanitize the file path supplied by a user, allowing the construction of a path that traverses to directories outside the intended scope. An attacker can exploit this path traversal flaw to request and download arbitrary files from the server, such as configuration files, credentials, or other sensitive data, thereby compromising confidentiality.

Affected Systems

The issue affects the rockgod100 Theme File Duplicator plugin for WordPress in all releases up to and including version 1.3. No specific sub‑versions are listed beyond the upper bound; the vulnerability is present from the initial release through the latest available pre‑1.4 release.

Risk and Exploitability

The CVSS score of 6.5 places the vulnerability in the medium severity range. The EPSS score of less than 1% indicates a low probability of exploitation in the wild, and the vulnerability is not currently listed in the CISA KEV catalog. Attackers could trigger the flaw via a crafted HTTP request to the plugin’s file download endpoint, provided the target site still hosts the affected plugin. With remote file read capabilities, the potential loss of confidential data or server compromise makes the risk non‑negligible for sites that rely on unsanitized file paths.

Generated by OpenCVE AI on May 1, 2026 at 09:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Theme File Duplicator plugin to the latest version that addresses the path traversal issue or uninstall it if no update is available.
  • Disable or remove the plugin if the application is not dependent on its functionality to prevent future exploitation.
  • Ensure server file permissions and web server configuration limit access to sensitive directories and enforce proper directory traversal checks in any custom code handling file paths.

Generated by OpenCVE AI on May 1, 2026 at 09:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11617 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in rockgod100 Theme File Duplicator allows Path Traversal. This issue affects Theme File Duplicator: from n/a through 1.3.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in rockgod100 Theme File Duplicator allows Path Traversal. This issue affects Theme File Duplicator: from n/a through 1.3. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in rockgod100 Theme File Duplicator theme-file-duplicator allows Path Traversal.This issue affects Theme File Duplicator: from n/a through <= 1.3.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Thu, 17 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in rockgod100 Theme File Duplicator allows Path Traversal. This issue affects Theme File Duplicator: from n/a through 1.3.
Title WordPress Theme File Duplicator Plugin <= 1.3 - Arbitrary File Download vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:47.027Z

Reserved: 2025-02-21T16:45:19.169Z

Link: CVE-2025-27283

cve-icon Vulnrichment

Updated: 2025-04-17T17:43:54.936Z

cve-icon NVD

Status : Deferred

Published: 2025-04-17T16:15:34.887

Modified: 2026-04-23T15:26:17.677

Link: CVE-2025-27283

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T09:30:14Z

Weaknesses