Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68002: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in 100plugins Open User Map

0
High
VulnerabilityCVE-2025-68002cvecve-2025-68002
Published: Fri Feb 20 2026 (02/20/2026, 15:46:34 UTC)
Source: CVE Database V5
Vendor/Project: 100plugins
Product: Open User Map

Description

CVE-2025-68002 is a path traversal vulnerability in the 100plugins Open User Map product, affecting versions up to and including 1. 4. 16. This vulnerability allows an attacker to manipulate file path inputs to access files and directories outside of the intended restricted directory. Exploitation does not require authentication, and no known exploits are currently reported in the wild. The vulnerability could lead to unauthorized disclosure of sensitive files or potentially enable further attacks depending on the environment. There is no CVSS score assigned yet, but the severity is assessed as high due to the potential impact and ease of exploitation. Organizations using Open User Map should prioritize patching once available and implement strict input validation and access controls as interim mitigations. Countries with significant usage of this plugin or related web mapping tools, especially those with critical infrastructure relying on such software, are at higher risk. Immediate attention is recommended to prevent exploitation in production environments.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:17:12 UTC

Technical Analysis

CVE-2025-68002 is a security vulnerability classified as an improper limitation of a pathname to a restricted directory, commonly known as a path traversal flaw, found in the 100plugins Open User Map software. This vulnerability affects all versions up to and including 1.4.16. Path traversal vulnerabilities occur when an application fails to properly sanitize user-supplied input that specifies file paths, allowing attackers to traverse directories outside of the intended restricted directory. In this case, the Open User Map plugin does not adequately restrict pathname inputs, enabling an attacker to access arbitrary files on the server's filesystem. This can lead to unauthorized disclosure of sensitive information such as configuration files, credentials, or other critical data stored on the server. Although no exploits are currently known in the wild, the flaw is inherently dangerous because it requires no authentication and can be triggered remotely by sending crafted requests to the vulnerable plugin. The lack of a CVSS score indicates that the vulnerability is newly published and has not yet been fully evaluated, but the nature of path traversal vulnerabilities typically results in a high severity rating due to their potential to compromise confidentiality and integrity. The vulnerability affects web applications that use the Open User Map plugin, which is commonly deployed in geographic information systems (GIS) and web mapping services. The technical details confirm the vulnerability was reserved in December 2025 and published in February 2026, with no patches currently linked, indicating that users must rely on mitigations until an official fix is released.

Potential Impact

The primary impact of CVE-2025-68002 is unauthorized access to files outside the intended directory, which can lead to the disclosure of sensitive information such as server configuration files, user credentials, or other protected data. This breach of confidentiality can facilitate further attacks, including privilege escalation, data exfiltration, or system compromise. For organizations relying on Open User Map for critical GIS or mapping services, this vulnerability could disrupt operations or expose sensitive geographic data. The ease of exploitation—requiring no authentication and no user interaction—makes this vulnerability particularly dangerous. If exploited, attackers could gain insights into the internal structure of the server, potentially enabling more sophisticated attacks. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability's public disclosure increases the risk of future exploitation. Organizations worldwide using this plugin in web-facing applications are at risk, especially those in sectors such as government, utilities, transportation, and defense where geographic data is critical.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict input validation to sanitize and restrict file path inputs to prevent traversal sequences such as '../'. Employ web application firewalls (WAFs) with rules designed to detect and block path traversal attempts targeting the Open User Map plugin endpoints. Restrict file system permissions for the web server process to the minimum necessary, ensuring that even if traversal occurs, access to sensitive files is limited. Monitor logs for suspicious requests containing directory traversal patterns and respond promptly to any indicators of compromise. Consider isolating the Open User Map service in a sandboxed environment or container to limit potential damage. Stay informed about updates from the vendor and apply patches immediately once available. Additionally, conduct a thorough security review of all plugins and third-party components to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:49.129Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9ecbe58cf853bab84da

Added to database: 2/20/2026, 8:54:04 PM

Last enriched: 2/20/2026, 9:17:12 PM

Last updated: 2/21/2026, 4:08:21 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats