Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13725: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in thimpress Thim Blocks

0
Medium
VulnerabilityCVE-2025-13725cvecve-2025-13725cwe-22
Published: Sat Jan 17 2026 (01/17/2026, 03:24:24 UTC)
Source: CVE Database V5
Vendor/Project: thimpress
Product: Thim Blocks

Description

The Gutenberg Thim Blocks – Page Builder, Gutenberg Blocks for the Block Editor plugin for WordPress is vulnerable to arbitrary file reads in all versions up to, and including, 1.0.1. This is due to insufficient path validation in the server-side rendering of the thim-blocks/icon block. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server via the 'iconSVG' parameter, which can contain sensitive information such as wp-config.php.

AI-Powered Analysis

AILast updated: 01/24/2026, 19:47:46 UTC

Technical Analysis

CVE-2025-13725 is a path traversal vulnerability classified under CWE-22 found in the Thim Blocks plugin for WordPress, specifically affecting the server-side rendering of the thim-blocks/icon block. The vulnerability stems from inadequate validation of the 'iconSVG' parameter, which allows an authenticated attacker with Contributor-level privileges or higher to manipulate the file path and read arbitrary files on the web server. Since WordPress contributors typically have permissions to create and edit content but not administer the site, this vulnerability escalates the risk by enabling them to access sensitive server files beyond their intended scope. Critical files such as wp-config.php, which contains database credentials and other sensitive configuration details, can be exposed, potentially leading to further compromise of the WordPress installation or underlying infrastructure. The vulnerability affects all versions of the plugin up to and including 1.0.1. The CVSS 3.1 base score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, and requiring privileges but no user interaction. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability's exploitation could facilitate information disclosure, aiding attackers in planning subsequent attacks such as privilege escalation or data exfiltration. The issue highlights the importance of rigorous input validation in server-side rendering components of WordPress plugins, especially those that handle file paths or user-supplied parameters.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data hosted on WordPress sites using the Thim Blocks plugin. Exposure of configuration files like wp-config.php can reveal database credentials, enabling attackers to access or manipulate backend databases, potentially leading to data breaches or site defacement. Organizations relying on WordPress for public-facing websites, intranets, or e-commerce platforms could face reputational damage, regulatory penalties under GDPR for data exposure, and operational disruptions. Since exploitation requires authenticated access at Contributor level or above, insider threats or compromised contributor accounts increase risk. The vulnerability does not directly impact system integrity or availability but can be a stepping stone for more severe attacks. European entities with large WordPress deployments or those in sectors with strict data protection requirements (finance, healthcare, government) are particularly vulnerable. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks, especially as threat actors often target popular CMS plugins.

Mitigation Recommendations

1. Immediately audit WordPress installations to identify the presence of the Thim Blocks plugin and verify the version in use. 2. Restrict Contributor-level access strictly to trusted users and review user permissions regularly to minimize the risk of insider exploitation. 3. Monitor server logs for unusual file access patterns, especially requests involving the 'iconSVG' parameter or attempts to access sensitive files like wp-config.php. 4. Implement Web Application Firewall (WAF) rules to detect and block path traversal attempts targeting the plugin's endpoints. 5. Until an official patch is released, consider disabling or removing the Thim Blocks plugin if it is not essential. 6. Employ file system permissions to restrict the web server's ability to read sensitive files where feasible. 7. Educate content contributors about security best practices to reduce the risk of account compromise. 8. Once a patch is available, apply it promptly and verify the fix through testing. 9. Use security plugins that scan for known vulnerabilities and anomalous file access within WordPress environments. 10. Regularly back up website data and configurations to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T22:29:33.290Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696b0749b22c7ad868788fc2

Added to database: 1/17/2026, 3:51:37 AM

Last enriched: 1/24/2026, 7:47:46 PM

Last updated: 2/7/2026, 3:55:42 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats