Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in tstafford include-file include-file allows Path Traversal.This issue affects include-file: from n/a through <= 1.
Published: 2025-04-03
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper limitation of a pathname allows an attacker to traverse the directory structure and download any file from the server. The primary impact is that an unauthenticated user can obtain confidential information, leading to potential data leakage or further exploitation. The weakness corresponds to CWE-22, Path Traversal.

Affected Systems

tstafford include-file plugin versions from n/a up to and including 1. The vulnerability affects all installed versions of the include-file plugin up to version 1, inclusive. No other products or versions are impacted.

Risk and Exploitability

With a CVSS score of 6.5, the vulnerability is considered moderate severity. The EPSS score is less than 1%, indicating a very low expected exploitation rate, and it is not listed in the CISA KEV catalog. The attack vector is inferred to be remote via the WordPress web interface, as the flaw was identified in a plugin that handles file download requests. Because the plugin does not properly sanitize path inputs, an attacker can request arbitrary files, achieving read‑only data disclosure. There are currently no publicly known exploits, but the potential for abuse remains, so monitoring and remediation are advised.

Generated by OpenCVE AI on May 1, 2026 at 01:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the include-file plugin to a version beyond 1, if a newer release is available.
  • Add input validation to the plugin’s download endpoint, allowing only files from a whitelisted directory and stripping any path‑traversal characters.
  • Configure file system permissions so that the web process cannot read sensitive directories outside the intended download folder.

Generated by OpenCVE AI on May 1, 2026 at 01:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14798 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound include-file allows Path Traversal. This issue affects include-file: from n/a through 1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound include-file allows Path Traversal. This issue affects include-file: from n/a through 1. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in tstafford include-file include-file allows Path Traversal.This issue affects include-file: from n/a through <= 1.
Title WordPress include-file <= 1 - Arbitrary File Download Vulnerability WordPress include-file plugin <= 1 - Arbitrary File Download Vulnerability
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Thu, 03 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Apr 2025 13:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound include-file allows Path Traversal. This issue affects include-file: from n/a through 1.
Title WordPress include-file <= 1 - Arbitrary File Download Vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:55.006Z

Reserved: 2025-03-24T13:00:32.065Z

Link: CVE-2025-30596

cve-icon Vulnrichment

Updated: 2025-04-03T14:59:32.412Z

cve-icon NVD

Status : Deferred

Published: 2025-04-03T14:15:33.450

Modified: 2026-04-23T15:26:56.453

Link: CVE-2025-30596

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T01:15:05Z

Weaknesses