Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in RomanCode MapSVG mapsvg allows Path Traversal.This issue affects MapSVG: from n/a through < 8.6.12.
Published: 2025-12-18
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in RomanCode MapSVG occurs because the plugin does not correctly restrict file path access. This allows an attacker to construct a request that references files outside the intended directory, effectively reading or downloading any file on the server that the web process can access. The weakness is a classic Path Traversal flaw mapped to CWE-22 and results in unauthorized information disclosure.

Affected Systems

Any WordPress installation that has the MapSVG plugin installed in a version earlier than 8.6.12 is vulnerable. This includes sites on any hosting environment where the plugin may be present, regardless of user role, because the flaw is triggered by a crafted HTTP request to the plugin’s file handling endpoint.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity risk. The EPSS score of less than 1% suggests low current exploit probability, and the entry is not listed in the CISA KEV catalog. The attack path is likely remote, where an attacker submits a specially formed URL or form containing path traversal sequences; if successful, they can retrieve arbitrary files such as configuration files, user uploads, or even database dumps, depending on file system permissions. No additional prerequisites such as authentication are mentioned, implying that the flaw can be leveraged by unauthenticated users, making the threat significant for exposed sites.

Generated by OpenCVE AI on April 29, 2026 at 13:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the MapSVG plugin to version 8.6.12 or later.
  • If an upgrade cannot be performed immediately, disable the plugin on production environments until a fix is applied.
  • Configure a web‑application firewall or equivalent filtering to block requests that contain path traversal patterns such as "../" or encoded equivalents.

Generated by OpenCVE AI on April 29, 2026 at 13:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Mapsvg
Mapsvg mapsvg
Wordpress
Wordpress wordpress
Vendors & Products Mapsvg
Mapsvg mapsvg
Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in RomanCode MapSVG mapsvg allows Path Traversal.This issue affects MapSVG: from n/a through < 8.6.12.
Title WordPress MapSVG Plugin < 8.6.12 - Arbitrary File Download Vulnerability
Weaknesses CWE-22
References

Subscriptions

Mapsvg Mapsvg
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:45:58.102Z

Reserved: 2025-07-28T10:56:48.470Z

Link: CVE-2025-54748

cve-icon Vulnrichment

Updated: 2025-12-18T19:12:58.616Z

cve-icon NVD

Status : Deferred

Published: 2025-12-18T08:15:56.187

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-54748

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T13:30:12Z

Weaknesses