Impact
The uListing plugin for WordPress contains a Path Traversal flaw that allows an attacker to download any file from the server by manipulating the file path. This vulnerability can expose sensitive configuration files or user data, leading to confidentiality loss. The weakness is classified as CWE-22, indicating improper limitation of a pathname to a restricted directory.
Affected Systems
WordPress sites running Stylemix uListing version 2.2.0 or earlier are affected. No specific version range beyond this is listed, so all releases through 2.2.0 are considered vulnerable.
Risk and Exploitability
The CVSS score of 4.9 indicates a moderate impact, while the EPSS score of less than 1% suggests a very low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote via the web interface, as the flaw can be triggered by crafting a URL containing path traversal sequences.
OpenCVE Enrichment