Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13070: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in CSV to SortTable

0
Unknown
VulnerabilityCVE-2025-13070cvecve-2025-13070cwe-22
Published: Tue Dec 09 2025 (12/09/2025, 06:00:08 UTC)
Source: CVE Database V5
Product: CSV to SortTable

Description

The CSV to SortTable WordPress plugin through 4.2 does not validate some shortcode attributes before using them to generate paths passed to include function/s, allowing any authenticated users such as contributor to perform LFI attacks.

AI-Powered Analysis

AILast updated: 12/09/2025, 06:11:14 UTC

Technical Analysis

CVE-2025-13070 is a path traversal vulnerability classified under CWE-22 found in the CSV to SortTable WordPress plugin versions through 4.2. The issue arises because the plugin does not properly validate certain shortcode attributes before using them to construct file paths passed to PHP include functions. This improper validation allows authenticated users with contributor-level access to manipulate these attributes to include arbitrary files from the server’s filesystem, leading to Local File Inclusion (LFI) attacks. LFI can enable attackers to read sensitive files such as configuration files, password stores, or other critical data, potentially escalating privileges or facilitating further attacks. The vulnerability requires the attacker to be authenticated, but contributor privileges are relatively low-level and commonly granted in WordPress environments, increasing the risk. No public exploits have been reported yet, but the vulnerability is published and known. The plugin is used in WordPress sites to convert CSV data into sortable tables, a common feature in many websites, increasing the attack surface. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for immediate mitigation steps. The vulnerability impacts confidentiality and integrity primarily, with potential indirect availability impacts if further exploitation occurs. The absence of a CVSS score necessitates an expert severity assessment based on these factors.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those relying on WordPress sites with the CSV to SortTable plugin installed. Unauthorized file access can lead to exposure of sensitive business data, user credentials, or internal configuration details, potentially resulting in data breaches or compliance violations under GDPR. Attackers with contributor-level access can exploit this vulnerability to escalate privileges or move laterally within the network. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often use WordPress for public-facing or internal portals, are at heightened risk. The impact extends to reputational damage and potential regulatory penalties if personal data is exposed. Since the vulnerability requires authentication but only low-level privileges, insider threats or compromised contributor accounts increase the risk. The lack of a patch means organizations must rely on compensating controls until an update is available. The threat is particularly relevant in Europe due to the widespread use of WordPress and the plugin’s popularity among European web developers and content managers.

Mitigation Recommendations

1. Immediately audit WordPress sites to identify installations of the CSV to SortTable plugin and verify the version in use. 2. Restrict contributor-level user accounts and review user permissions to ensure only trusted users have such access. 3. Implement strict input validation and sanitization on shortcode attributes if custom modifications are possible. 4. Disable or remove the CSV to SortTable plugin temporarily if patching is not yet available. 5. Monitor web server logs for unusual file inclusion attempts or suspicious shortcode usage patterns. 6. Employ Web Application Firewalls (WAFs) with rules targeting path traversal and LFI patterns to block exploitation attempts. 7. Educate content managers and contributors about the risks of this vulnerability and the importance of secure practices. 8. Stay updated with vendor advisories for patches or updates addressing this vulnerability and apply them promptly once released. 9. Conduct regular security assessments and penetration testing focusing on WordPress plugins and user privilege abuse. 10. Consider implementing file integrity monitoring to detect unauthorized changes or access to critical files.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-11-12T14:25:22.022Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6937bd663ce8502056bafcc2

Added to database: 12/9/2025, 6:10:46 AM

Last enriched: 12/9/2025, 6:11:14 AM

Last updated: 12/10/2025, 11:26:18 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats