GHSA-5vxp-83xg-5c9fHighCVSS 7.5
The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and...
🔗 CVE IDs covered (1)
📋 Description
The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter directly to the theme root directory path without sanitizing directory traversal sequences. This makes it possible for unauthenticated attackers to trigger the creation of a ZIP archive containing arbitrary files from the server's filesystem — including wp-config.
🔗 References (13)
- https://nvd.nist.gov/vuln/detail/CVE-2026-6403
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L62
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L631
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.php#L162
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.php#L248
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L62
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L631
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L162
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L248
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3514238%40quick-playground&new=3514238%40quick-playground&sfp_email=&sfph_mail=
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3523317%40quick-playground&new=3523317%40quick-playground&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a39dccb6-b635-44af-b0e0-c3010b719773?source=cve
- https://github.com/advisories/GHSA-5vxp-83xg-5c9f