Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Mitchell Bennis Simple File List simple-file-list allows Path Traversal.This issue affects Simple File List: from n/a through <= 6.1.15.
Published: 2026-02-20
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file download via path traversal
Action: Apply patch
AI Analysis

Impact

Exploitable path traversal flaw exists in the Mitchell Bennis Simple File List WordPress plugin, allowing an attacker to download any file on the web server by manipulating the download parameter. The vulnerability permits disclosure of confidential information (e.g., configuration files, user data, or code) but does not provide arbitrary code execution. The flaw is classed as CWE-22 and has a CVSS score of 6.5, indicating medium severity for confidentiality loss and potential service disruption.

Affected Systems

All installations of the Mitchell Bennis Simple File List plugin with versions 6.1.15 and earlier are affected. The vulnerability applies uniformly across all releases in that range, regardless of WordPress version, and is likely present on any WordPress site that has an unpatched instance of the plugin.

Risk and Exploitability

The CVSS score of 6.5 reflects significant risk to confidentiality. EPSS indicates a very low probability of real‑world exploitation (<1%), and the flaw is not included in the CISA KEV catalog. Attackers can exploit the flaw remotely from the public internet by issuing a crafted request to the plugin’s file download endpoint; no local privilege or authentication is required if the endpoint is publicly accessible. Because the flaw allows arbitrary file download, it can be used as a data exfiltration vector or to obtain files necessary for subsequent attacks.

Generated by OpenCVE AI on April 15, 2026 at 23:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Mitchell Bennis Simple File List to version 6.1.16 or later to patch the path traversal flaw.
  • If an immediate upgrade is not possible, disable the plugin’s file download functionality or remove the plugin entirely to eliminate the vulnerable endpoint.
  • Ensure the web server’s file system permissions restrict read access to sensitive directories, and employ server‑side access controls (.htaccess, Nginx allow/deny) to prevent the plugin from serving files outside its intended scope.

Generated by OpenCVE AI on April 15, 2026 at 23:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 23:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Mitchell Bennis
Mitchell Bennis simple File List
Wordpress
Wordpress wordpress
Vendors & Products Mitchell Bennis
Mitchell Bennis simple File List
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Mitchell Bennis Simple File List simple-file-list allows Path Traversal.This issue affects Simple File List: from n/a through <= 6.1.15.
Title WordPress Simple File List plugin <= 6.1.15 - Arbitrary File Download vulnerability
Weaknesses CWE-22
References

Subscriptions

Mitchell Bennis Simple File List
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:14:33.618Z

Reserved: 2026-01-28T09:50:29.518Z

Link: CVE-2026-24953

cve-icon Vulnrichment

Updated: 2026-02-23T20:58:14.384Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T16:22:39.547

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24953

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T00:00:14Z

Weaknesses