CVE-2025-3295: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in benjaminprojas WP Editor
CVE-2025-3295 is a path traversal vulnerability in the benjaminprojas WP Editor WordPress plugin affecting all versions up to 1. 2. 9. 1. It allows authenticated users with Administrator-level privileges or higher to read arbitrary files on the web server. This vulnerability does not require user interaction beyond authentication but requires high privileges. Exploitation can lead to exposure of sensitive information such as configuration files, credentials, or other critical data stored on the server. The CVSS score is 4. 9 (medium severity), reflecting the limited scope of exploitation to privileged users and the lack of impact on integrity or availability. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2025-3295 is a security vulnerability classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, commonly known as a path traversal flaw) found in the benjaminprojas WP Editor plugin for WordPress. This vulnerability exists in all versions up to and including 1.2.9.1. The flaw allows an authenticated attacker with Administrator-level access or higher to exploit the plugin's insufficient validation of file path inputs, enabling arbitrary file read operations on the server hosting the WordPress site. By manipulating file path parameters, the attacker can traverse directories outside the intended restricted directory, accessing sensitive files such as configuration files, database backups, or other critical data. The vulnerability does not require user interaction beyond authentication and does not impact the integrity or availability of the system, but it compromises confidentiality. The CVSS v3.1 base score is 4.9, indicating medium severity, with attack vector network (remote), low attack complexity, high privileges required, no user interaction, unchanged scope, high confidentiality impact, and no integrity or availability impact. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability poses a risk primarily to WordPress sites using the affected plugin versions, especially those with multiple administrators or high-value data stored on the server.
Potential Impact
The primary impact of CVE-2025-3295 is unauthorized disclosure of sensitive information stored on the web server hosting the vulnerable WordPress site. Attackers with administrator privileges can read arbitrary files, potentially exposing database credentials, private keys, configuration files, or other sensitive data that could facilitate further attacks such as privilege escalation, data theft, or site compromise. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach can lead to significant operational and reputational damage. Organizations relying on the WP Editor plugin in environments with multiple administrators or where administrator credentials might be compromised are at higher risk. The medium CVSS score reflects the requirement for high privileges, limiting exploitation to insiders or attackers who have already gained administrative access, but the ease of reading arbitrary files once authenticated makes it a serious concern for data protection and compliance with privacy regulations.
Mitigation Recommendations
To mitigate CVE-2025-3295, organizations should immediately verify if they are using the benjaminprojas WP Editor plugin version 1.2.9.1 or earlier and plan to upgrade to a patched version once available. In the absence of an official patch, administrators should restrict plugin access strictly to trusted users and consider disabling or removing the plugin if it is not essential. Implementing strict file system permissions on the server to limit the web server user’s access to sensitive files can reduce the impact of arbitrary file reads. Monitoring and auditing administrator activities and access logs can help detect suspicious behavior indicative of exploitation attempts. Additionally, enforcing strong authentication mechanisms, including multi-factor authentication for administrator accounts, can reduce the risk of unauthorized access. Regular backups and incident response plans should be updated to address potential data exposure scenarios. Finally, security teams should stay alert for any emerging exploit code or patches related to this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2025-3295: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in benjaminprojas WP Editor
Description
CVE-2025-3295 is a path traversal vulnerability in the benjaminprojas WP Editor WordPress plugin affecting all versions up to 1. 2. 9. 1. It allows authenticated users with Administrator-level privileges or higher to read arbitrary files on the web server. This vulnerability does not require user interaction beyond authentication but requires high privileges. Exploitation can lead to exposure of sensitive information such as configuration files, credentials, or other critical data stored on the server. The CVSS score is 4. 9 (medium severity), reflecting the limited scope of exploitation to privileged users and the lack of impact on integrity or availability. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2025-3295 is a security vulnerability classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, commonly known as a path traversal flaw) found in the benjaminprojas WP Editor plugin for WordPress. This vulnerability exists in all versions up to and including 1.2.9.1. The flaw allows an authenticated attacker with Administrator-level access or higher to exploit the plugin's insufficient validation of file path inputs, enabling arbitrary file read operations on the server hosting the WordPress site. By manipulating file path parameters, the attacker can traverse directories outside the intended restricted directory, accessing sensitive files such as configuration files, database backups, or other critical data. The vulnerability does not require user interaction beyond authentication and does not impact the integrity or availability of the system, but it compromises confidentiality. The CVSS v3.1 base score is 4.9, indicating medium severity, with attack vector network (remote), low attack complexity, high privileges required, no user interaction, unchanged scope, high confidentiality impact, and no integrity or availability impact. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability poses a risk primarily to WordPress sites using the affected plugin versions, especially those with multiple administrators or high-value data stored on the server.
Potential Impact
The primary impact of CVE-2025-3295 is unauthorized disclosure of sensitive information stored on the web server hosting the vulnerable WordPress site. Attackers with administrator privileges can read arbitrary files, potentially exposing database credentials, private keys, configuration files, or other sensitive data that could facilitate further attacks such as privilege escalation, data theft, or site compromise. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach can lead to significant operational and reputational damage. Organizations relying on the WP Editor plugin in environments with multiple administrators or where administrator credentials might be compromised are at higher risk. The medium CVSS score reflects the requirement for high privileges, limiting exploitation to insiders or attackers who have already gained administrative access, but the ease of reading arbitrary files once authenticated makes it a serious concern for data protection and compliance with privacy regulations.
Mitigation Recommendations
To mitigate CVE-2025-3295, organizations should immediately verify if they are using the benjaminprojas WP Editor plugin version 1.2.9.1 or earlier and plan to upgrade to a patched version once available. In the absence of an official patch, administrators should restrict plugin access strictly to trusted users and consider disabling or removing the plugin if it is not essential. Implementing strict file system permissions on the server to limit the web server user’s access to sensitive files can reduce the impact of arbitrary file reads. Monitoring and auditing administrator activities and access logs can help detect suspicious behavior indicative of exploitation attempts. Additionally, enforcing strong authentication mechanisms, including multi-factor authentication for administrator accounts, can reduce the risk of unauthorized access. Regular backups and incident response plans should be updated to address potential data exposure scenarios. Finally, security teams should stay alert for any emerging exploit code or patches related to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-04T17:16:43.214Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b29b7ef31ef0b54ed9f
Added to database: 2/25/2026, 9:35:37 PM
Last enriched: 2/25/2026, 10:33:10 PM
Last updated: 2/26/2026, 7:04:31 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.