vulnerability
WordPress Plugin: hot-random-image: CVE-2025-4419: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | May 21, 2025 | May 22, 2025 | May 22, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
May 21, 2025
Added
May 22, 2025
Modified
May 22, 2025
Description
The Hot Random Image plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.9.2 via the 'path' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to access arbitrary images with allowed extensions, outside of the originally intended directory.
Solution
hot-random-image-plugin-cve-2025-4419

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.