Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13725: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in thimpress Thim Blocks

0
Medium
VulnerabilityCVE-2025-13725cvecve-2025-13725cwe-22
Published: Sat Jan 17 2026 (01/17/2026, 03:24:24 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: Thim Blocks

Description

CVE-2025-13725 is a path traversal vulnerability in the Thim Blocks WordPress plugin, allowing authenticated users with Contributor-level access or higher to read arbitrary files on the server. The flaw arises from insufficient validation of the 'iconSVG' parameter in the server-side rendering of the thim-blocks/icon block. Exploiting this vulnerability can expose sensitive files such as wp-config. php, potentially leaking database credentials and other critical configuration data. The vulnerability affects all versions up to and including 1. 0. 1 and has a CVSS score of 6. 5, indicating medium severity. No known exploits are currently reported in the wild. This vulnerability does not impact integrity or availability but poses a significant confidentiality risk.

AI-Powered Analysis

AILast updated: 01/17/2026, 04:06:48 UTC

Technical Analysis

CVE-2025-13725 is a path traversal vulnerability classified under CWE-22 found in the Thim Blocks – Page Builder plugin for WordPress, specifically in the server-side rendering of the thim-blocks/icon block. The vulnerability stems from insufficient validation of the 'iconSVG' parameter, which is used to specify SVG icons. Authenticated attackers with Contributor-level permissions or higher can exploit this flaw by manipulating the 'iconSVG' parameter to traverse directories and read arbitrary files on the web server. This can lead to exposure of sensitive files such as wp-config.php, which contains database credentials and other critical configuration details. The vulnerability affects all versions up to and including 1.0.1 of the plugin. The CVSS v3.1 base score is 6.5, reflecting a medium severity rating due to the network attack vector, low attack complexity, and requirement for privileges but no user interaction. The vulnerability impacts confidentiality but does not affect integrity or availability. No patches are currently listed, and no known exploits have been reported in the wild. The flaw is significant because Contributor-level access is commonly granted to trusted users such as content creators, making it a realistic threat in multi-user WordPress environments. The plugin’s widespread use in WordPress sites increases the attack surface, especially in organizations relying on this plugin for page building and block editing.

Potential Impact

For European organizations, this vulnerability poses a substantial confidentiality risk. Exposure of sensitive files like wp-config.php can lead to database credential theft, enabling further compromise such as database access, data exfiltration, or privilege escalation. Organizations with multi-user WordPress environments that grant Contributor or higher access levels are particularly vulnerable. Since WordPress is widely used across Europe for corporate websites, e-commerce, and content management, exploitation could lead to data breaches, loss of customer trust, and regulatory penalties under GDPR if personal data is exposed. The vulnerability does not directly impact system integrity or availability, but the resulting data exposure can facilitate more severe attacks. The medium severity rating suggests that while exploitation requires some privileges, the ease of exploitation and potential impact on confidentiality make it a notable risk. European organizations with limited patch management or weak access controls are at higher risk. The absence of known exploits in the wild currently reduces immediate threat but does not eliminate the risk of future exploitation.

Mitigation Recommendations

1. Immediately audit and restrict user roles in WordPress to ensure that only trusted users have Contributor-level or higher access, minimizing the number of potential attackers. 2. Monitor and limit plugin usage, and consider disabling or removing the Thim Blocks plugin if not essential. 3. Implement strict input validation and sanitization for parameters like 'iconSVG' at the application level, if possible, to prevent path traversal attempts. 4. Regularly update the Thim Blocks plugin to the latest version once a patch addressing this vulnerability is released. 5. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal patterns targeting the 'iconSVG' parameter. 6. Conduct regular security audits and file integrity monitoring to detect unauthorized file access or changes. 7. Harden server file permissions to restrict access to sensitive files such as wp-config.php, ensuring the web server user has minimal necessary permissions. 8. Educate site administrators and developers about the risks of excessive privileges and the importance of least privilege principles in WordPress environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T22:29:33.290Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696b0749b22c7ad868788fc2

Added to database: 1/17/2026, 3:51:37 AM

Last enriched: 1/17/2026, 4:06:48 AM

Last updated: 1/17/2026, 4:55:10 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats