Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in samsk Include URL include-url allows Path Traversal.This issue affects Include URL: from n/a through <= 0.3.5.
Published: 2025-04-01
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper limitation of a pathname to a restricted directory, allowing path traversal on the WordPress Include URL plugin. This flaw lets an attacker download any file the web server can read, potentially revealing sensitive data or code. It represents a CWE‑22 weakness and results in an information disclosure risk. The damage is limited to the ability to read files; it does not grant immediate code execution or remote shell access, but the stolen data could enable further attacks.

Affected Systems

The word‑press plugin Include URL from the vendor samsk is affected for all releases from the initial release up to and including version 0.3.5. Users running these or older unpublished builds should consider updating or disabling the plugin.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity. The EPSS score is less than 1 %, suggesting a low probability of exploitation, and it is not listed in CISA’s KEV catalog. The likely attack path requires web access to the plugin’s download endpoint; the description does not state if authentication is required, so the vector is inferred to be local to the web server or possibly remote via a browser. Because the flaw permits arbitrary file reads, it poses a real risk to confidentiality, especially for sites storing private configuration or content on the same server.

Generated by OpenCVE AI on May 1, 2026 at 02:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Include URL to a version newer than 0.3.5, which removes the path traversal flaw.
  • If the plugin is not required, deactivate or uninstall it to eliminate the attack surface.
  • Monitor HTTP traffic for requests to the download endpoint to detect potential exploitation attempts and investigate any unauthorized file download attempts.

Generated by OpenCVE AI on May 1, 2026 at 02:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9100 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Include URL allows Path Traversal. This issue affects Include URL: from n/a through 0.3.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Include URL allows Path Traversal. This issue affects Include URL: from n/a through 0.3.5. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in samsk Include URL include-url allows Path Traversal.This issue affects Include URL: from n/a through <= 0.3.5.
Title WordPress Include URL <= 0.3.5 Arbitrary File Download Vulnerability WordPress Include URL plugin <= 0.3.5 Arbitrary File Download Vulnerability
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Tue, 01 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 05:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound Include URL allows Path Traversal. This issue affects Include URL: from n/a through 0.3.5.
Title WordPress Include URL <= 0.3.5 Arbitrary File Download Vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:54.951Z

Reserved: 2025-03-24T13:00:32.065Z

Link: CVE-2025-30594

cve-icon Vulnrichment

Updated: 2025-04-01T16:17:47.556Z

cve-icon NVD

Status : Deferred

Published: 2025-04-01T06:15:49.773

Modified: 2026-04-23T15:26:56.240

Link: CVE-2025-30594

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T02:45:06Z

Weaknesses