Description
Path Traversal: '.../...//' vulnerability in AA-Team Pro Bulk Watermark Plugin for WordPress allows Path Traversal.This issue affects Pro Bulk Watermark Plugin for WordPress: from n/a through 2.0.
Published: 2025-08-30
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a path traversal flaw present in the AA‑Team Pro Bulk Watermark Plugin for WordPress up through version 2.0. The flaw arises from an improperly sanitized path component that allows an attacker to craft input containing "../..//", which the plugin then passes to file system operations. This enables the attacker to read arbitrary files on the server, potentially exposing sensitive configuration, source code, or user data. The underlying weakness is categorized as CWE‑35.

Affected Systems

All installations of the AA‑Team Pro Bulk Watermark Plugin for WordPress with a version of 2.0 or earlier are affected. The CVE notes that the range is from unknown older releases through 2.0, meaning any deployment of the plugin at or below that version is vulnerable.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, while the EPSS score of less than 1% suggests that the likelihood of exploitation is very low at this time. The vulnerability is not listed in the CISA KEV catalog. The plugin operates within the WordPress media handling workflow, so the attack vector is inferred to be remote via authenticated or unauthenticated use of the watermarking feature, depending on the site’s configuration. No exploitation prerequisites beyond the vulnerability’s presence are explicitly stated; however, the attacker would need to supply the crafted input that triggers the path traversal.

Generated by OpenCVE AI on April 30, 2026 at 15:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the AA‑Team Pro Bulk Watermark Plugin for WordPress to the latest available version, ensuring it is beyond 2.0.
  • If an update is not currently available, disable or uninstall the plugin to eliminate the attack surface.
  • As a temporary measure, configure the web server or application firewall to block requests containing path traversal patterns such as "../..//" to prevent the malicious input from reaching the plugin code.

Generated by OpenCVE AI on April 30, 2026 at 15:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-26249 Path Traversal: '.../...//' vulnerability in AA-Team Pro Bulk Watermark Plugin for WordPress allows Path Traversal.This issue affects Pro Bulk Watermark Plugin for WordPress: from n/a through 2.0.
History

Tue, 02 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 02 Sep 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Aa-team
Aa-team pro Bulk Watermark Plugin
Wordpress
Wordpress wordpress
Vendors & Products Aa-team
Aa-team pro Bulk Watermark Plugin
Wordpress
Wordpress wordpress

Sat, 30 Aug 2025 02:15:00 +0000

Type Values Removed Values Added
Description Path Traversal: '.../...//' vulnerability in AA-Team Pro Bulk Watermark Plugin for WordPress allows Path Traversal.This issue affects Pro Bulk Watermark Plugin for WordPress: from n/a through 2.0.
Title WordPress Pro Bulk Watermark Plugin for WordPress Theme <= 2.0 - Path Traversal Vulnerability
Weaknesses CWE-35
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Aa-team Pro Bulk Watermark Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:05.682Z

Reserved: 2025-05-19T14:42:13.456Z

Link: CVE-2025-4956

cve-icon Vulnrichment

Updated: 2025-09-02T17:26:45.442Z

cve-icon NVD

Status : Deferred

Published: 2025-08-30T02:15:32.790

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-4956

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T15:30:16Z

Weaknesses