Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in pixelgrade Category Icon category-icon allows Path Traversal.This issue affects Category Icon: from n/a through <= 1.0.1.
Published: 2025-04-03
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Category Icon plugin for WordPress contains a path traversal flaw (CWE‑22). An attacker can craft a request that causes the plugin to read and serve files outside its intended directory, allowing the download of arbitrary files on the server. This may expose sensitive data such as configuration files, database credentials or code, compromising confidentiality.

Affected Systems

Any WordPress installation that has the Category Icon plugin from pixelgrade version 1.0.1 or earlier is affected. The vulnerability applies to all sites where this plugin is active, regardless of other security controls.

Risk and Exploitability

The vulnerability carries a CVSS score of 4.9, indicating a moderate severity. The EPSS score is below 1%, suggesting a low likelihood of exploitation in the wild, and the issue is not listed in the CISA KEV catalog. Exploitation likely requires only a standard web request to the plugin’s file retrieval functionality, but the CVE description does not explicitly state whether authentication or special privileges are required; therefore, the need for such credentials remains uncertain.

Generated by OpenCVE AI on May 2, 2026 at 02:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Category Icon plugin to a version newer than 1.0.1 if a fixed release is available.
  • If no updated version exists, disable or remove the plugin from the WordPress site to eliminate the vulnerable code.
  • Restrict file access for the plugin’s directory on the web server, ensuring it cannot serve files from parent directories, and set appropriate file permissions to limit read access.

Generated by OpenCVE AI on May 2, 2026 at 02:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14736 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in pixelgrade Category Icon allows Path Traversal. This issue affects Category Icon: from n/a through 1.0.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in pixelgrade Category Icon allows Path Traversal. This issue affects Category Icon: from n/a through 1.0.0. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in pixelgrade Category Icon category-icon allows Path Traversal.This issue affects Category Icon: from n/a through <= 1.0.1.
Title WordPress Category Icon plugin <= 1.0.0 - Arbitrary File Download vulnerability WordPress Category Icon plugin <= 1.0.1 - Arbitrary File Download vulnerability
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Thu, 03 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 03 Apr 2025 13:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in pixelgrade Category Icon allows Path Traversal. This issue affects Category Icon: from n/a through 1.0.0.
Title WordPress Category Icon plugin <= 1.0.0 - Arbitrary File Download vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:13.786Z

Reserved: 2025-04-01T13:20:32.606Z

Link: CVE-2025-31825

cve-icon Vulnrichment

Updated: 2025-04-03T19:04:26.081Z

cve-icon NVD

Status : Deferred

Published: 2025-04-03T14:15:40.190

Modified: 2026-04-23T15:28:22.000

Link: CVE-2025-31825

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T02:45:32Z

Weaknesses