Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in docxpresso Docxpresso docxpresso allows Absolute Path Traversal.This issue affects Docxpresso: from n/a through <= 2.6.
Published: 2025-04-03
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability allows a path traversal flaw that leads to Absolute Path Traversal in the Docxpresso WordPress plugin. An attacker can obtain files located outside the intended download directory, potentially exposing sensitive configuration data, user uploads, or other confidential information. The weakness is classified as CWE-22, indicating improper pathname restriction.

Affected Systems

The affected product is the Docxpresso WordPress plugin version 2.6 and earlier. All releases from the initial version up to 2.6 are vulnerable; upgrading to a later version is required to remediate.

Risk and Exploitability

The CVSS score of 5.9 marks this as a medium‑severity issue, while the EPSS score of less than 1% suggests a low probability of exploitation at present, and it is not listed in the CISA KEV catalog. The likely attack vector involves a crafted HTTP request to the plugin’s file‑download endpoint that does not enforce proper path validation, allowing an attacker to request any file on the server’s filesystem.

Generated by OpenCVE AI on May 1, 2026 at 01:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Docxpresso plugin to a version above 2.6, where the path traversal issue has been fixed.
  • If an immediate upgrade is not possible, restrict access to the plugin’s file‑download endpoint to authenticated administrators only, or block it entirely using the web server’s configuration.
  • Deploy a web application firewall or application‑level rule that detects and blocks absolute path traversal patterns targeting the Docxpresso plugin.
  • Consider replacing the plugin with an alternative that implements strict access control and input validation for file downloads.

Generated by OpenCVE AI on May 1, 2026 at 01:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14750 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in docxpresso Docxpresso allows Absolute Path Traversal. This issue affects Docxpresso: from n/a through 2.6.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in docxpresso Docxpresso allows Absolute Path Traversal. This issue affects Docxpresso: from n/a through 2.6. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in docxpresso Docxpresso docxpresso allows Absolute Path Traversal.This issue affects Docxpresso: from n/a through <= 2.6.
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Thu, 03 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Apr 2025 13:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in docxpresso Docxpresso allows Absolute Path Traversal. This issue affects Docxpresso: from n/a through 2.6.
Title WordPress Docxpresso plugin <= 2.6 - Arbitrary File Download vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:08.758Z

Reserved: 2025-03-31T10:05:35.680Z

Link: CVE-2025-31554

cve-icon Vulnrichment

Updated: 2025-04-03T14:58:52.174Z

cve-icon NVD

Status : Deferred

Published: 2025-04-03T14:15:36.793

Modified: 2026-04-23T15:27:57.407

Link: CVE-2025-31554

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T01:15:05Z

Weaknesses