Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12960: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in iworks Simple CSV Table

0
Medium
VulnerabilityCVE-2025-12960cvecve-2025-12960cwe-22
Published: Fri Dec 12 2025 (12/12/2025, 08:20:03 UTC)
Source: CVE Database V5
Vendor/Project: iworks
Product: Simple CSV Table

Description

The Simple CSV Table plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.0.1 via the `href` parameter in the `[csv]` shortcode. This is due to insufficient path validation before concatenating user-supplied input to a base directory path. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information such as database credentials and authentication keys.

AI-Powered Analysis

AILast updated: 12/19/2025, 09:36:50 UTC

Technical Analysis

CVE-2025-12960 is a path traversal vulnerability classified under CWE-22 affecting the Simple CSV Table plugin for WordPress, specifically all versions up to and including 1.0.1. The vulnerability arises because the plugin fails to properly validate the 'href' parameter passed within the [csv] shortcode before concatenating it with a base directory path. This improper limitation allows an authenticated attacker with Contributor-level or higher privileges to manipulate the parameter to traverse directories and access arbitrary files on the server filesystem. Since WordPress Contributor roles can upload and manage content but not install plugins or themes, this level of access is relatively common in multi-user environments. The attacker can thus read sensitive files such as configuration files containing database credentials, authentication keys, or other critical information, compromising confidentiality. The CVSS v3.1 score is 6.5 (medium severity), reflecting network attack vector, low attack complexity, required privileges (low), no user interaction, and high confidentiality impact but no integrity or availability impact. No known exploits have been reported in the wild yet. The vulnerability affects all versions of the plugin up to 1.0.1, and no official patches are currently linked, indicating the need for immediate mitigation steps by administrators. The flaw is exploitable remotely over the network once authenticated, making it a significant risk for WordPress sites using this plugin.

Potential Impact

For European organizations, this vulnerability presents a substantial risk to the confidentiality of sensitive data hosted on WordPress sites using the Simple CSV Table plugin. Attackers with Contributor-level access can exfiltrate critical configuration files, potentially leading to further compromise such as database breaches or unauthorized access to other systems. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often rely on WordPress for content management, could face data leakage, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The ease of exploitation combined with the commonality of Contributor roles in collaborative environments increases the attack surface. Since the vulnerability does not affect integrity or availability directly, the immediate impact is data exposure rather than service disruption. However, leaked credentials could facilitate subsequent attacks with broader impact. The lack of known exploits in the wild provides a window for proactive defense, but the risk remains significant due to the widespread use of WordPress and the plugin.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit WordPress sites to identify installations of the Simple CSV Table plugin and verify the version; 2) Restrict Contributor-level privileges to trusted users only, minimizing the number of accounts that can exploit this vulnerability; 3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal patterns in the 'href' parameter of the [csv] shortcode; 4) Monitor server and WordPress logs for unusual file access patterns indicative of directory traversal attempts; 5) Disable or remove the plugin if it is not essential to reduce the attack surface; 6) Apply strict input validation or sanitization on parameters if custom modifications are possible; 7) Stay alert for official patches or updates from the vendor and apply them promptly once released; 8) Consider isolating WordPress instances in segmented network zones to limit lateral movement if compromise occurs; 9) Educate content contributors about the risks of privilege misuse and enforce strong authentication controls to prevent account compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-10T16:42:32.877Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bd715406b3dd4e013825b

Added to database: 12/12/2025, 8:49:25 AM

Last enriched: 12/19/2025, 9:36:50 AM

Last updated: 2/7/2026, 11:08:35 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats