CVE-2023-2252: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Unknown Directorist
The Directorist WordPress plugin before 7.5.4 is vulnerable to Local File Inclusion as it does not validate the file parameter when importing CSV files.
AI Analysis
Technical Summary
CVE-2023-2252 is a vulnerability identified in the Directorist WordPress plugin versions prior to 7.5.4. The issue is classified as CWE-22, which corresponds to an improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. Specifically, this vulnerability arises because the plugin does not properly validate the 'file' parameter during the import of CSV files. This lack of validation can lead to Local File Inclusion (LFI), where an attacker could potentially manipulate the file path to access files outside the intended directory. However, the vulnerability requires high privileges (PR:H) to exploit, meaning an attacker must have authenticated access with elevated permissions on the WordPress site. The CVSS v3.1 base score is 2.7, indicating a low severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and no impact on integrity or availability, only a limited confidentiality impact (C:L). No known exploits are currently reported in the wild, and no patches are linked in the provided data, though the vulnerability is fixed in version 7.5.4 and later. The vulnerability could allow an authenticated user to read sensitive files on the server, potentially exposing configuration files or other sensitive data stored on the web server hosting the WordPress site.
Potential Impact
For European organizations using the Directorist plugin on their WordPress sites, the impact of this vulnerability is relatively limited due to the requirement for high-level authentication and the low severity score. However, if an attacker gains administrative or equivalent access, they could exploit this vulnerability to read sensitive files on the server, potentially exposing credentials, configuration files, or other sensitive data. This could lead to further attacks such as privilege escalation or lateral movement within the network. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or government, could face compliance risks if sensitive data is exposed. Additionally, the reputational damage from a breach involving sensitive data exposure could be significant. Since the vulnerability does not allow remote unauthenticated exploitation or direct code execution, the immediate risk is lower compared to more severe vulnerabilities, but it still represents a potential foothold for attackers with some level of access.
Mitigation Recommendations
European organizations should ensure that all WordPress plugins, including Directorist, are updated to the latest version (7.5.4 or later) where this vulnerability is patched. Since no patch links were provided, organizations should verify updates directly from the official plugin repository or vendor. Access controls should be strictly enforced to limit administrative privileges only to trusted users, reducing the risk of exploitation by malicious insiders or compromised accounts. Implementing Web Application Firewalls (WAFs) with rules to detect and block path traversal attempts can provide an additional layer of defense. Regular security audits and monitoring of file access logs can help detect suspicious activity related to file inclusion attempts. Finally, organizations should consider isolating WordPress environments and sensitive files to minimize the impact of any potential LFI vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2023-2252: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Unknown Directorist
Description
The Directorist WordPress plugin before 7.5.4 is vulnerable to Local File Inclusion as it does not validate the file parameter when importing CSV files.
AI-Powered Analysis
Technical Analysis
CVE-2023-2252 is a vulnerability identified in the Directorist WordPress plugin versions prior to 7.5.4. The issue is classified as CWE-22, which corresponds to an improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. Specifically, this vulnerability arises because the plugin does not properly validate the 'file' parameter during the import of CSV files. This lack of validation can lead to Local File Inclusion (LFI), where an attacker could potentially manipulate the file path to access files outside the intended directory. However, the vulnerability requires high privileges (PR:H) to exploit, meaning an attacker must have authenticated access with elevated permissions on the WordPress site. The CVSS v3.1 base score is 2.7, indicating a low severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and no impact on integrity or availability, only a limited confidentiality impact (C:L). No known exploits are currently reported in the wild, and no patches are linked in the provided data, though the vulnerability is fixed in version 7.5.4 and later. The vulnerability could allow an authenticated user to read sensitive files on the server, potentially exposing configuration files or other sensitive data stored on the web server hosting the WordPress site.
Potential Impact
For European organizations using the Directorist plugin on their WordPress sites, the impact of this vulnerability is relatively limited due to the requirement for high-level authentication and the low severity score. However, if an attacker gains administrative or equivalent access, they could exploit this vulnerability to read sensitive files on the server, potentially exposing credentials, configuration files, or other sensitive data. This could lead to further attacks such as privilege escalation or lateral movement within the network. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or government, could face compliance risks if sensitive data is exposed. Additionally, the reputational damage from a breach involving sensitive data exposure could be significant. Since the vulnerability does not allow remote unauthenticated exploitation or direct code execution, the immediate risk is lower compared to more severe vulnerabilities, but it still represents a potential foothold for attackers with some level of access.
Mitigation Recommendations
European organizations should ensure that all WordPress plugins, including Directorist, are updated to the latest version (7.5.4 or later) where this vulnerability is patched. Since no patch links were provided, organizations should verify updates directly from the official plugin repository or vendor. Access controls should be strictly enforced to limit administrative privileges only to trusted users, reducing the risk of exploitation by malicious insiders or compromised accounts. Implementing Web Application Firewalls (WAFs) with rules to detect and block path traversal attempts can provide an additional layer of defense. Regular security audits and monitoring of file access logs can help detect suspicious activity related to file inclusion attempts. Finally, organizations should consider isolating WordPress environments and sensitive files to minimize the impact of any potential LFI vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-04-24T13:20:39.810Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683dd85d182aa0cae24d8159
Added to database: 6/2/2025, 4:59:09 PM
Last enriched: 7/3/2025, 5:27:55 PM
Last updated: 8/16/2025, 12:20:47 AM
Views: 19
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.