CVE-2026-5957: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in roxnor EmailKit – Email Customizer for WooCommerce & WP
CVE-2026-5957 is a path traversal vulnerability in the EmailKit plugin for WordPress (up to version 1. 6. 5). It allows authenticated users with Author-level access or higher to read arbitrary files on the server by exploiting a flawed pathname validation in the create_template() method. The issue arises because the realpath() function is called on a directory that may not exist, returning false, which leads to a bypass of the path validation check in PHP 8. x. This enables reading sensitive files such as wp-config. php via the emailkit-editor-template REST API parameter.
AI Analysis
Technical Summary
The EmailKit plugin for WooCommerce & WordPress contains a path traversal vulnerability (CWE-22) due to improper validation of file paths in the create_template() method of the CheckForm class. The plugin uses realpath() on the base directory 'wp-content/uploads/emailkit/templates/', but if this directory does not exist, realpath() returns false. In PHP 8.x, strpos() called with false as the second argument is implicitly converted to an empty string, causing the path validation check to be bypassed. Authenticated attackers with Author-level privileges or higher can exploit this to read arbitrary files on the server by supplying an absolute path to the emailkit-editor-template REST API parameter.
Potential Impact
An attacker with Author-level or higher privileges can read arbitrary files on the server, including sensitive configuration files like wp-config.php. This can lead to disclosure of sensitive information such as database credentials and other secrets. The vulnerability does not allow modification or denial of service but poses a confidentiality risk. The CVSS v3.1 base score is 6.5 (medium severity), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and high confidentiality impact.
Mitigation Recommendations
Patch status is not yet confirmed — no official fix or patch is currently available from the vendor. Users should monitor the vendor advisory for updates. Until a fix is released, restrict Author-level access to trusted users only and consider disabling or limiting use of the EmailKit plugin's template editing features. Avoid exposing the vulnerable REST API endpoint to untrusted users. No official or temporary fixes are documented at this time.
CVE-2026-5957: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in roxnor EmailKit – Email Customizer for WooCommerce & WP
Description
CVE-2026-5957 is a path traversal vulnerability in the EmailKit plugin for WordPress (up to version 1. 6. 5). It allows authenticated users with Author-level access or higher to read arbitrary files on the server by exploiting a flawed pathname validation in the create_template() method. The issue arises because the realpath() function is called on a directory that may not exist, returning false, which leads to a bypass of the path validation check in PHP 8. x. This enables reading sensitive files such as wp-config. php via the emailkit-editor-template REST API parameter.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The EmailKit plugin for WooCommerce & WordPress contains a path traversal vulnerability (CWE-22) due to improper validation of file paths in the create_template() method of the CheckForm class. The plugin uses realpath() on the base directory 'wp-content/uploads/emailkit/templates/', but if this directory does not exist, realpath() returns false. In PHP 8.x, strpos() called with false as the second argument is implicitly converted to an empty string, causing the path validation check to be bypassed. Authenticated attackers with Author-level privileges or higher can exploit this to read arbitrary files on the server by supplying an absolute path to the emailkit-editor-template REST API parameter.
Potential Impact
An attacker with Author-level or higher privileges can read arbitrary files on the server, including sensitive configuration files like wp-config.php. This can lead to disclosure of sensitive information such as database credentials and other secrets. The vulnerability does not allow modification or denial of service but poses a confidentiality risk. The CVSS v3.1 base score is 6.5 (medium severity), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and high confidentiality impact.
Mitigation Recommendations
Patch status is not yet confirmed — no official fix or patch is currently available from the vendor. Users should monitor the vendor advisory for updates. Until a fix is released, restrict Author-level access to trusted users only and consider disabling or limiting use of the EmailKit plugin's template editing features. Avoid exposing the vulnerable REST API endpoint to untrusted users. No official or temporary fixes are documented at this time.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-04-09T09:01:29.056Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69f96cc0cbff5d86109c3922
Added to database: 5/5/2026, 4:06:24 AM
Last enriched: 5/5/2026, 4:21:52 AM
Last updated: 5/5/2026, 5:20:17 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.