Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ThimPress WP Pipes wp-pipes allows Path Traversal.This issue affects WP Pipes: from n/a through <= 1.4.3.
Published: 2025-10-22
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WP Pipes plugin contains an improper limitation of a pathname that allows path traversal, enabling the deletion of any file on the web server. This flaw directly jeopardizes the integrity and availability of site content, configuration files, and critical media. The weakness is classified as CWE‑22, reflecting a classic path traversal vulnerability that can tamper with the file system.

Affected Systems

All WordPress sites that include the ThimPress WP Pipes plugin version 1.4.3 or earlier are vulnerable. The plugin itself is affected, regardless of other installed WordPress components. The vulnerability is identified in the Common Platform Enumeration for a WordPress plugin, not a specific operating system or application bundle.

Risk and Exploitability

With a CVSS score of 8.6 the vulnerability is high severity, yet the EPSS score of less than 1 % indicates a low likelihood of exploitation at present. It is not listed in the CISA KEV catalog. The attack is likely to occur through web requests to the plugin’s file handling interface; authentication is not explicitly required by the description, so the attack may be carried out by unauthenticated users or those with limited privileges. Successful exploitation would result in the removal of arbitrary files, potentially crippling the application or destroying essential data.

Generated by OpenCVE AI on April 30, 2026 at 05:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update WP Pipes to a version newer than 1.4.3 to eliminate the path‑traversal handling flaw.
  • If an upgrade cannot be performed immediately, deactivate the WP Pipes plugin to remove the attack surface while ensuring the site remains functional.
  • Enforce strict filesystem permissions so that the web‑server process cannot delete files outside the intended directories, and monitor logs for signs of unauthorized file deletion attempts.

Generated by OpenCVE AI on April 30, 2026 at 05:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}

cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 26 Nov 2025 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:thimpress:wp_pipes:*:*:*:*:*:wordpress:*:*

Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 23 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Thimpress
Thimpress wp Pipes
Wordpress
Wordpress wordpress
Vendors & Products Thimpress
Thimpress wp Pipes
Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ThimPress WP Pipes wp-pipes allows Path Traversal.This issue affects WP Pipes: from n/a through <= 1.4.3.
Title WordPress WP Pipes plugin <= 1.4.3 - Arbitrary File Deletion vulnerability
Weaknesses CWE-22
References

Subscriptions

Thimpress Wp Pipes
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:58.105Z

Reserved: 2025-09-25T15:34:33.695Z

Link: CVE-2025-60227

cve-icon Vulnrichment

Updated: 2025-10-23T17:30:44.686Z

cve-icon NVD

Status : Modified

Published: 2025-10-22T15:15:59.877

Modified: 2026-04-27T16:16:33.870

Link: CVE-2025-60227

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T05:30:06Z

Weaknesses