Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in tainacan Tainacan tainacan allows Path Traversal.This issue affects Tainacan: from n/a through <= 0.21.14.
Published: 2025-05-23
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a path traversal flaw that permits deletion of arbitrary files on the server. By supplying a specially crafted path, an attacker can cause the plugin to delete files that are not restricted to the intended directory. This can result in loss of critical WordPress data, configuration files, or media assets, thereby compromising data integrity and potentially disrupting site availability. The weakness is classified as CWE‑22, improper limitation of a pathname to a restricted directory.

Affected Systems

The issue affects the Tainacan WordPress plugin, versions up to and including 0.21.14. Users running the Tainacan plugin on any WordPress installation with a version identifier of 0.21.14 or earlier are impacted.

Risk and Exploitability

The CVSS score of 8.6 reflects a high severity, while the EPSS score of less than 1% indicates a low probability of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector involves interacting with the plugin’s file deletion endpoint, which may require authenticated access to the WordPress admin interface; therefore, attackers with administrative credentials pose a higher threat. Even without full admin rights, targeted exploitation might still be possible through exposed endpoints or query parameters, so the risk remains significant for sites with exposed administrative interfaces.

Generated by OpenCVE AI on May 1, 2026 at 08:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tainacan plugin to the latest available version (0.21.15 or newer) which removes the path traversal flaw.
  • If an update is not immediately possible, restrict the plugin’s file‑deletion API to authenticated, privileged users only and block any directory traversal characters via a web application firewall rule.
  • Validate and sanitize all file path input within the plugin or via a custom patch to ensure it remains within a dedicated upload directory, preventing unintended deletions.

Generated by OpenCVE AI on May 1, 2026 at 08:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28088 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in tainacan Tainacan allows Path Traversal. This issue affects Tainacan: from n/a through 0.21.14.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in tainacan Tainacan allows Path Traversal. This issue affects Tainacan: from n/a through 0.21.14. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in tainacan Tainacan tainacan allows Path Traversal.This issue affects Tainacan: from n/a through <= 0.21.14.
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Fri, 23 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 May 2025 13:00:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in tainacan Tainacan allows Path Traversal. This issue affects Tainacan: from n/a through 0.21.14.
Title WordPress Tainacan plugin <= 0.21.14 - Arbitrary File Deletion vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

Tainacan Tainacan
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:43.569Z

Reserved: 2025-05-07T09:39:30.830Z

Link: CVE-2025-47512

cve-icon Vulnrichment

Updated: 2025-05-23T15:14:37.813Z

cve-icon NVD

Status : Deferred

Published: 2025-05-23T13:15:38.443

Modified: 2026-04-23T15:30:22.423

Link: CVE-2025-47512

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T08:15:12Z

Weaknesses