Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9215: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kodezen StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More

0
Medium
VulnerabilityCVE-2025-9215cvecve-2025-9215cwe-22
Published: Wed Sep 17 2025 (09/17/2025, 06:17:47 UTC)
Source: CVE Database V5
Vendor/Project: kodezen
Product: StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More

Description

The StoreEngine – Powerful WordPress eCommerce Plugin for Payments, Memberships, Affiliates, Sales & More plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.0 via the file_download() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:46:47 UTC

Technical Analysis

CVE-2025-9215 is a path traversal vulnerability identified in the StoreEngine plugin for WordPress, a widely used eCommerce solution that supports payments, memberships, affiliates, and sales functionalities. The vulnerability exists in the file_download() function, which fails to properly sanitize or restrict pathname inputs, allowing attackers to traverse directories and access arbitrary files on the server. Exploitation requires the attacker to be authenticated with at least Subscriber-level privileges, which are commonly granted to registered users on WordPress sites. By exploiting this flaw, an attacker can read sensitive files such as configuration files, database backups, or other sensitive data stored on the server, potentially leading to information disclosure. The vulnerability affects all versions up to and including 1.5.0 of the plugin. The CVSS v3.1 base score is 6.5, reflecting a medium severity with high confidentiality impact but no impact on integrity or availability. The attack vector is network-based with low attack complexity and no user interaction beyond authentication. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the sensitive nature of data accessible via path traversal. The root cause is improper limitation of pathname inputs (CWE-22), a common security flaw in web applications that handle file system operations. Since the plugin is used in eCommerce environments, the exposure of sensitive information could facilitate further attacks such as credential theft or site compromise.

Potential Impact

The primary impact of CVE-2025-9215 is unauthorized disclosure of sensitive server files, which can include configuration files containing database credentials, API keys, or other private information. This can lead to further compromise of the WordPress site or connected systems. Organizations running the vulnerable plugin risk data breaches that may expose customer information, payment details, or proprietary business data. Although the vulnerability does not allow modification or deletion of files, the confidentiality breach alone can have severe consequences including reputational damage, regulatory penalties, and financial loss. The requirement for authenticated access somewhat limits the scope, but Subscriber-level access is commonly granted, increasing the attack surface. Since WordPress powers a significant portion of the web and StoreEngine targets eCommerce sites, the potential scale of impact is substantial. Attackers could leverage disclosed information to escalate privileges, conduct phishing campaigns, or deploy malware. The absence of known exploits in the wild suggests a window for proactive mitigation, but the risk remains high for sites that do not promptly address the vulnerability.

Mitigation Recommendations

1. Immediate mitigation includes restricting Subscriber-level user capabilities to the minimum necessary, potentially disabling file download features until a patch is available. 2. Monitor web server and application logs for unusual file access patterns, especially attempts to access sensitive files outside expected directories. 3. Implement web application firewall (WAF) rules to detect and block path traversal attempts targeting the file_download() function or similar endpoints. 4. Apply the vendor’s patch or update the StoreEngine plugin to a version that addresses this vulnerability as soon as it is released. 5. Conduct a thorough audit of user roles and permissions to ensure that only trusted users have Subscriber-level or higher access. 6. Consider isolating the WordPress environment and sensitive files using containerization or file system permissions to limit the impact of potential traversal. 7. Educate site administrators about the risks of path traversal and the importance of timely updates. 8. Backup critical data regularly and securely to enable recovery in case of compromise. These steps go beyond generic advice by focusing on access control tightening, active monitoring, and layered defenses specific to the vulnerability’s exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-19T20:03:22.388Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cab09db62c8e2e63b2468e

Added to database: 9/17/2025, 12:59:09 PM

Last enriched: 2/26/2026, 5:46:47 PM

Last updated: 3/25/2026, 12:24:30 AM

Views: 164

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses