Description
Path Traversal: '.../...//' vulnerability in beeteam368 VidMov vidmov allows Path Traversal.This issue affects VidMov: from n/a through <= 2.3.8.
Published: 2026-01-08
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Read via Path Traversal
Action: Apply Patch
AI Analysis

Impact

A pathname normalization flaw in beeteam368’s VidMov WordPress theme allows an attacker to supply a crafted path containing repeated separators such as '.../...//' which can bypass directory boundaries. This vulnerability satisfies CWE-35 and can be exploited to read any file on the server that the web process can access, potentially exposing configuration files, credentials, or other sensitive data. The impact is significant because it enables non‑privileged attackers to disclose confidential information without authentication.

Affected Systems

The flaw exists in the VidMov theme released by beeteam368 and affects all installations using versions up to and including 2.3.8. Any WordPress site that has deployed this theme and has not updated beyond 2.3.8 is vulnerable.

Risk and Exploitability

The CVSS score of 7.7 indicates a high severity risk, but the EPSS score of < 1% suggests that exploitation attempts are currently rare. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires a web request that can supply the malicious path; the server’s file handling routine must be invoked by the theme’s functionality. Because the attack is remote and does not require privileged access, it poses a significant threat to confidentiality for affected sites.

Generated by OpenCVE AI on April 28, 2026 at 18:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the VidMov theme to version 2.3.9 or later, which removes the path traversal bug.
  • If an upgrade is not immediately possible, consider deactivating or uninstalling the VidMov theme until a fix can be applied.
  • Restrict file system permissions for the WordPress web process so it can only read files from trusted directories, reducing the impact if the traversal flaw were to be abused.
  • Monitor web server logs for repeated '.../' or other anomalous path patterns to detect probing attacks.

Generated by OpenCVE AI on April 28, 2026 at 18:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Beeteam368
Beeteam368 vidmov
Wordpress
Wordpress wordpress
Vendors & Products Beeteam368
Beeteam368 vidmov
Wordpress
Wordpress wordpress

Thu, 08 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Thu, 08 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
Description Path Traversal: '.../...//' vulnerability in beeteam368 VidMov vidmov allows Path Traversal.This issue affects VidMov: from n/a through <= 2.3.8.
Title WordPress VidMov theme <= 2.3.8 - Path Traversal vulnerability
Weaknesses CWE-35
References

Subscriptions

Beeteam368 Vidmov
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:22.989Z

Reserved: 2025-12-15T09:59:40.762Z

Link: CVE-2025-67914

cve-icon Vulnrichment

Updated: 2026-01-08T14:56:29.194Z

cve-icon NVD

Status : Deferred

Published: 2026-01-08T10:15:50.217

Modified: 2026-04-27T18:16:48.327

Link: CVE-2025-67914

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T18:30:37Z

Weaknesses