Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in John Weissberg Print Science Designer print-science-designer allows Path Traversal.This issue affects Print Science Designer: from n/a through <= 1.3.155.
Published: 2025-04-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

John Weissberg’s Print Science Designer plugin contains a path‑traversal flaw that lets an attacker request and download arbitrary files from the server’s filesystem. By supplying a specially crafted filename parameter, the plugin’s download routine resolves and reads files outside the intended directory, potentially revealing sensitive configuration files, credentials, or other confidential data.

Affected Systems

The vulnerability affects all versions of Print Science Designer from the initial release through version 1.3.155, inclusive. WordPress sites that have installed any of these plugin versions are susceptible.

Risk and Exploitability

With a CVSS score of 7.5 the flaw is considered high severity, yet the EPSS score indicates a very low probability of exploitation, and it is not currently listed in CISA’s KEV catalog. The attack vector is remote via the web – an attacker only needs to construct a URL to the plugin’s download endpoint and supply a path‑traversal string. Successful exploitation grants read access to files that may contain critical information.

Generated by OpenCVE AI on April 30, 2026 at 22:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Print Science Designer plugin to the latest version that contains the path‑traversal fix.
  • If an upgrade cannot be performed immediately, restrict the download functionality to privileged users or disable it entirely in the plugin’s settings.
  • Implement a web application firewall or security plugins that block path‑traversal patterns before they reach the application.

Generated by OpenCVE AI on April 30, 2026 at 22:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10741 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in John Weissberg Print Science Designer allows Path Traversal. This issue affects Print Science Designer: from n/a through 1.3.155.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in John Weissberg Print Science Designer allows Path Traversal. This issue affects Print Science Designer: from n/a through 1.3.155. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in John Weissberg Print Science Designer print-science-designer allows Path Traversal.This issue affects Print Science Designer: from n/a through <= 1.3.155.
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Fri, 11 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 11 Apr 2025 09:00:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in John Weissberg Print Science Designer allows Path Traversal. This issue affects Print Science Designer: from n/a through 1.3.155.
Title WordPress Print Science Designer plugin <= 1.3.155 - Arbitrary File Download vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:27.756Z

Reserved: 2025-04-09T11:21:18.307Z

Link: CVE-2025-32671

cve-icon Vulnrichment

Updated: 2025-04-11T13:28:55.877Z

cve-icon NVD

Status : Deferred

Published: 2025-04-11T09:15:35.530

Modified: 2026-04-23T15:29:19.270

Link: CVE-2025-32671

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T23:00:04Z

Weaknesses