Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in piotnetdotcom Piotnet Forms piotnetforms.This issue affects Piotnet Forms: from n/a through <= 1.0.30.
Published: 2025-04-10
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper limitation of a pathname to a restricted directory, known as Path Traversal (CWE-22), in the Piotnet Forms plugin for WordPress. This flaw allows an attacker to manipulate file paths used by the plugin, potentially enabling the reading or inclusion of arbitrary files outside the intended directory scope. While the description does not specify the ability to execute uploaded code, the possibility of exposing sensitive configuration or credential files presents a risk to confidentiality and could be leveraged to gain further footholds if such files contain credentials.

Affected Systems

Affected by the vulnerability are installations of the Piotnet Forms plugin from version n/a through 1.0.30. The plugin is developed by piotnetdotcom and is available for WordPress sites. The version range indicates all releases up to and including 1.0.30 suffer from the issue, regardless of the surrounding WordPress version.

Risk and Exploitability

The CVSS score of 2.7 reflects a low severity assessment, and the EPSS score of less than 1% indicates a rare likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Attack vectors are not explicitly detailed in the description, so the attack path is inferred to be local or through unauthenticated file access. A system with exposed file permissions or an attacker with the ability to submit file paths to the plugin would be required to exploit the flaw. Because the flaw only permits file access and no attacker‑controlled code execution is documented, the immediate risk is limited to information disclosure or potential credential leakage.

Generated by OpenCVE AI on April 30, 2026 at 23:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Piotnet Forms to version 1.0.31 or later, if available, to eliminate the path traversal flaw.
  • Configure the WordPress site to restrict access to the plugin's upload and configuration directories, ensuring they are not publicly accessible via the web.
  • Implement strict file permission settings on the server to prevent the web process from reading sensitive files outside the intended directories.

Generated by OpenCVE AI on April 30, 2026 at 23:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10459 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in piotnetdotcom Piotnet Forms. This issue affects Piotnet Forms: from n/a through 1.0.30.
History

Wed, 29 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in piotnetdotcom Piotnet Forms. This issue affects Piotnet Forms: from n/a through 1.0.30. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in piotnetdotcom Piotnet Forms piotnetforms.This issue affects Piotnet Forms: from n/a through <= 1.0.30.
Title WordPress piotnetforms plugin <=1.0.30 - Path Traversal vulnerability WordPress Piotnet Forms plugin <= 1.0.30 - Path Traversal vulnerability
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


Thu, 10 Apr 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 10 Apr 2025 08:15:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in piotnetdotcom Piotnet Forms. This issue affects Piotnet Forms: from n/a through 1.0.30.
Title WordPress piotnetforms plugin <=1.0.30 - Path Traversal vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:51:54.917Z

Reserved: 2025-04-04T10:01:35.760Z

Link: CVE-2025-32205

cve-icon Vulnrichment

Updated: 2025-04-10T13:05:44.096Z

cve-icon NVD

Status : Deferred

Published: 2025-04-10T08:15:17.490

Modified: 2026-04-29T10:16:45.603

Link: CVE-2025-32205

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T23:30:03Z

Weaknesses