Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in themezaa Litho litho allows Path Traversal.This issue affects Litho: from n/a through <= 3.0.
Published: 2025-06-17
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper limitation of a pathname to a restricted directory (CWE‑22) that allows an attacker to traverse paths and delete arbitrary files through the WordPress Litho theme. An attacker could script deletion of any file on the server that the web process can write to, leading to loss of site content, configuration files, or backups. The high CVSS score of 8.6 reflects the potential for data loss and site disruption, although no code execution is required.

Affected Systems

This flaw affects the Litho theme from its earliest released version up through version 3.0. WordPress sites that have installed and activated this theme are vulnerable. The issue is tied to the themezaa Litho theme, and administrators should check whether their installations are running these affected releases.

Risk and Exploitability

The CVSS score of 8.6 shows a high severity, while the EPSS score of < 1% indicates a low likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector appears to be remote via HTTP requests targeting the theme’s file handling endpoints, allowing an attacker to traverse to arbitrary files and delete them. If the attacker can write to the file system, they could remove critical site content, configuration files, or backups, leading to data loss, site disruption, or providing a foothold for further compromise. No code execution is required, but the ability to delete files can serve as a denial‑of‑service or a means to remove security controls.

Generated by OpenCVE AI on April 30, 2026 at 17:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Litho theme update (≥ 3.1) to remove the path‑traversal flaw.
  • If an update cannot be installed immediately, deactivate or uninstall the Litho theme to eliminate the vulnerable code path.
  • Reduce file system write privileges for the web‑server user and use a WAF or security plugin to block path‑traversal attempts.

Generated by OpenCVE AI on April 30, 2026 at 17:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19221 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in themezaa Litho allows Path Traversal. This issue affects Litho: from n/a through 3.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in themezaa Litho allows Path Traversal. This issue affects Litho: from n/a through 3.0. Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in themezaa Litho litho allows Path Traversal.This issue affects Litho: from n/a through <= 3.0.
Title WordPress Litho <= 3.0 - Arbitrary File Deletion Vulnerability WordPress Litho theme <= 3.0 - Arbitrary File Deletion Vulnerability
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Thu, 26 Jun 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in themezaa Litho allows Path Traversal. This issue affects Litho: from n/a through 3.0.
Title WordPress Litho <= 3.0 - Arbitrary File Deletion Vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:06.690Z

Reserved: 2025-06-11T16:06:15.666Z

Link: CVE-2025-49879

cve-icon Vulnrichment

Updated: 2025-06-26T17:52:40.277Z

cve-icon NVD

Status : Deferred

Published: 2025-06-17T15:15:52.567

Modified: 2026-04-23T15:31:46.300

Link: CVE-2025-49879

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T18:00:14Z

Weaknesses