Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spicethemes Spice Blocks spice-blocks allows Path Traversal.This issue affects Spice Blocks: from n/a through <= 2.0.7.4.
Published: 2025-06-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Spice Blocks plugin for WordPress contains an improper restriction on pathname usage, enabling path traversal through an arbitrary file download mechanism. An attacker can supply a specially crafted request that causes the plugin to access files outside of the intended directory, potentially exposing configuration files, credentials, or other sensitive data. This weakness results in confidentiality leakage rather than code execution or denial of service.

Affected Systems

All installations of Spice Blocks version 2.0.7.4 or earlier, as distributed by spicethemes, are affected. No other versions are mentioned in the advisory.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity. The EPSS score of less than 1% suggests that the exploit probability is currently low. This vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is remote exploitation via the plugin’s file download endpoint, possibly without requiring authentication; however, the description does not explicitly state authentication prerequisites, so this is inferred from the nature of the flaw.

Generated by OpenCVE AI on April 30, 2026 at 18:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Spice Blocks plugin to a version newer than 2.0.7.4 once a patch is released.
  • If an upgrade is not immediately available, disable the file‑download functionality of the plugin or restrict access to the endpoint using a .htaccess rule or a security plugin rule that allows only authenticated administrators to use it.
  • Configure the web server to prevent directory traversal, for example by setting Apache’s AllowOverride to None for the plugin’s directory or by using a web‑application firewall rule that blocks requests containing ".." sequences in the URL.

Generated by OpenCVE AI on April 30, 2026 at 18:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-17530 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spicethemes Spice Blocks allows Path Traversal. This issue affects Spice Blocks: from n/a through 2.0.7.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spicethemes Spice Blocks allows Path Traversal. This issue affects Spice Blocks: from n/a through 2.0.7.2. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spicethemes Spice Blocks spice-blocks allows Path Traversal.This issue affects Spice Blocks: from n/a through <= 2.0.7.4.
Title WordPress Spice Blocks <= 2.0.7.2 - Arbitrary File Download Vulnerability WordPress Spice Blocks plugin <= 2.0.7.4 - Arbitrary File Download vulnerability
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00057}

epss

{'score': 0.00062}


Tue, 10 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Jun 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in spicethemes Spice Blocks allows Path Traversal. This issue affects Spice Blocks: from n/a through 2.0.7.2.
Title WordPress Spice Blocks <= 2.0.7.2 - Arbitrary File Download Vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:52.327Z

Reserved: 2025-05-15T18:01:28.792Z

Link: CVE-2025-48130

cve-icon Vulnrichment

Updated: 2025-06-10T13:42:35.646Z

cve-icon NVD

Status : Deferred

Published: 2025-06-09T16:15:43.280

Modified: 2026-04-23T15:30:51.060

Link: CVE-2025-48130

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T18:15:06Z

Weaknesses