Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12960: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in iworks Simple CSV Table

0
Medium
VulnerabilityCVE-2025-12960cvecve-2025-12960cwe-22
Published: Fri Dec 12 2025 (12/12/2025, 08:20:03 UTC)
Source: CVE Database V5
Vendor/Project: iworks
Product: Simple CSV Table

Description

The Simple CSV Table plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.0.1 via the `href` parameter in the `[csv]` shortcode. This is due to insufficient path validation before concatenating user-supplied input to a base directory path. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information such as database credentials and authentication keys.

AI-Powered Analysis

AILast updated: 12/12/2025, 08:49:41 UTC

Technical Analysis

CVE-2025-12960 is a path traversal vulnerability classified under CWE-22 affecting the Simple CSV Table plugin for WordPress, versions up to and including 1.0.1. The vulnerability arises because the plugin fails to properly validate the 'href' parameter used in the [csv] shortcode before concatenating it with a base directory path. This improper limitation allows an authenticated attacker with Contributor-level privileges or higher to manipulate the path and access arbitrary files on the web server. Such files may include sensitive configuration files like wp-config.php, which contain database credentials and authentication keys, potentially leading to further compromise. The vulnerability does not require user interaction but does require authentication, which limits the attack surface to users with some level of content editing permissions. The CVSS 3.1 score of 6.5 reflects a medium severity, with high confidentiality impact but no impact on integrity or availability. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be addressed promptly. The plugin is widely used in WordPress environments, making this a relevant threat for many websites relying on it for CSV table display functionality.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive server-side information, including database credentials and authentication keys, which can lead to further compromise of the website and backend systems. Organizations with WordPress sites that use the Simple CSV Table plugin and allow contributors or higher-level users to add or edit content are particularly vulnerable. The exposure of sensitive data can result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR), and potential financial penalties. Since WordPress is widely used across Europe for business and governmental websites, the impact can be significant, especially for sectors that handle sensitive or personal data. The vulnerability could also be leveraged as a foothold for more advanced attacks, including privilege escalation and lateral movement within the network.

Mitigation Recommendations

1. Immediately audit WordPress sites to identify installations of the Simple CSV Table plugin and verify the version in use. 2. Restrict Contributor-level and higher privileges to trusted users only, minimizing the number of users who can exploit this vulnerability. 3. Until a patch is released, consider disabling or uninstalling the Simple CSV Table plugin to eliminate the attack vector. 4. Implement web application firewall (WAF) rules to detect and block attempts to exploit directory traversal patterns in the 'href' parameter of the [csv] shortcode. 5. Monitor logs for suspicious access patterns or attempts to read sensitive files. 6. Educate content contributors about the risks of uploading or linking to untrusted files or paths. 7. Once a patch becomes available, apply it promptly and verify the fix. 8. Employ principle of least privilege for file system permissions to limit the impact of any file disclosure. 9. Regularly back up website data and configurations to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-10T16:42:32.877Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bd715406b3dd4e013825b

Added to database: 12/12/2025, 8:49:25 AM

Last enriched: 12/12/2025, 8:49:41 AM

Last updated: 12/12/2025, 10:53:17 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats