Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AmentoTech Workreap (theme's plugin) workreap allows Path Traversal.This issue affects Workreap (theme's plugin): from n/a through <= 3.3.5.
Published: 2025-10-22
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in the Workreap plugin is a Path Traversal flaw (CWE-22) that allows an attacker to delete arbitrary files on the server. By manipulating the file path used by the plugin’s code, an attacker can specify any filesystem location, resulting in the removal of files that may be critical to the website’s operation or confidentiality. The impact is a direct loss of data and potentially service interruption, as important configuration or content files can be permanently deleted.

Affected Systems

The affected product is the AmentoTech Workreap (theme's plugin) for WordPress. Versions from the earliest release up through 3.3.5 are impacted, with no specific lower bound stated in the description. Users running any Workreap version 3.3.5 or earlier should verify the installation of the plugin and assess whether it is still in use.

Risk and Exploitability

The CVSS score of 7.7 indicates a high severity and the lack of enlightenment on privileges suggests that exploitation could be carried out by an unauthenticated or low-privileged attacker. The EPSS score of less than 1% indicates that, while the flaw is significant, the likelihood of exploitation in the wild is low at this time. The vulnerability is not listed in CISA’s KEV catalog, so there is no evidence of widespread active exploitation. It is inferred that an attacker could trigger the flaw through a crafted request that includes a directory traversal string in a file path parameter, but the exact input vector is not detailed in the advisory.

Generated by OpenCVE AI on April 29, 2026 at 23:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Workreap plugin to the latest version released by AmentoTech, which addresses the path traversal issue.
  • If an update is not immediately available, uninstall or disable the Workreap plugin to eliminate the vulnerability from the site.
  • After updating or removing the plugin, review the site’s file permissions and ensure that any residual directories are not writable by external input, and consider implementing server‑side checks to prevent path traversal in other applications.

Generated by OpenCVE AI on April 29, 2026 at 23:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}

cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Amentotech
Amentotech workreap
Wordpress
Wordpress wordpress
Vendors & Products Amentotech
Amentotech workreap
Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AmentoTech Workreap (theme's plugin) workreap allows Path Traversal.This issue affects Workreap (theme's plugin): from n/a through <= 3.3.5.
Title WordPress Workreap (theme's plugin) plugin <= 3.3.5 - Arbitrary File Deletion vulnerability
Weaknesses CWE-22
References

Subscriptions

Amentotech Workreap
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:52.478Z

Reserved: 2025-09-17T18:00:53.704Z

Link: CVE-2025-59566

cve-icon Vulnrichment

Updated: 2025-10-22T19:40:56.882Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T15:15:55.447

Modified: 2026-04-27T20:16:24.220

Link: CVE-2025-59566

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T23:45:16Z

Weaknesses