Description
Path Traversal vulnerability in WHMPress WHMpress allows Relative Path Traversal. This issue affects WHMpress: from 6.2 through revision.
Published: 2025-05-16
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw is a relative path traversal in the WHMPress plugin that permits an attacker to read arbitrary files on the web server by manipulating the file parameter. The vulnerability is categorized as CWE‑35, indicating improper path handling. This local file inclusion can expose sensitive configuration data or credentials that should not be publicly accessible.

Affected Systems

WordPress sites that use the WHMPress plugin versions 6.2 through revision 9 (inclusive) are affected. The plugin is distributed by WHMPress and any installation running these versions of the plugin is vulnerable to the relative path traversal flaw.

Risk and Exploitability

The CVSS score of 7.5 classifies the issue as high severity. The EPSS score of less than 1 % indicates that exploit attempts are currently infrequent, and the vulnerability is not listed in CISA’s KEV catalog. Nevertheless, because the flaw can be triggered by a crafted HTTP request without authentication, a publicly accessible site could expose confidential files. Administrators should weigh the high impact of unauthorized file disclosure against the low likelihood of exploitation.

Generated by OpenCVE AI on May 1, 2026 at 08:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WHMPress plugin to a version newer than 6.2‑revision‑9 that contains the LFI fix.
  • If an immediate upgrade is not feasible, configure the web server or a Web Application Firewall to block requests that contain directory‑traversal patterns such as "../" for the WHMPress endpoints.
  • Apply stricter path‑sanitization logic in the plugin, ensuring only whitelisted file paths or extensions are accessible; consider enforcing a controlled list of allowed files.

Generated by OpenCVE AI on May 1, 2026 at 08:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-15493 Path Traversal vulnerability in WHMPress WHMpress allows Relative Path Traversal. This issue affects WHMpress: from 6.2 through revision.
History

Tue, 28 Apr 2026 19:45:00 +0000


Tue, 28 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description Path Traversal: '.../...//' vulnerability in WHMPress WHMpress whmpress allows Relative Path Traversal.This issue affects WHMpress: from n/a through <= 6.2-revision-9. Path Traversal vulnerability in WHMPress WHMpress allows Relative Path Traversal. This issue affects WHMpress: from 6.2 through revision.
References

Thu, 23 Apr 2026 15:30:00 +0000


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Path Traversal vulnerability in WHMPress WHMpress allows Relative Path Traversal. This issue affects WHMpress: from 6.2 through revision. Path Traversal: '.../...//' vulnerability in WHMPress WHMpress whmpress allows Relative Path Traversal.This issue affects WHMpress: from n/a through <= 6.2-revision-9.
References

Fri, 16 May 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 16 May 2025 16:00:00 +0000

Type Values Removed Values Added
Description Path Traversal vulnerability in WHMPress WHMpress allows Relative Path Traversal. This issue affects WHMpress: from 6.2 through revision.
Title WordPress WHMpress plugin <= 6.2-revision-9 - Local File Inclusion vulnerability
Weaknesses CWE-35
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:32.741Z

Reserved: 2025-04-16T06:23:58.700Z

Link: CVE-2025-39492

cve-icon Vulnrichment

Updated: 2025-05-16T16:20:19.436Z

cve-icon NVD

Status : Deferred

Published: 2025-05-16T16:15:40.667

Modified: 2026-04-28T19:32:01.313

Link: CVE-2025-39492

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T08:45:06Z

Weaknesses