CVE-2025-4956
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-30

Last updated on: 2025-09-02

Assigner: Patchstack

Description
Path Traversal: '.../...//' vulnerability in AA-Team Pro Bulk Watermark Plugin for WordPress allows Path Traversal.This issue affects Pro Bulk Watermark Plugin for WordPress: from n/a through 2.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-30
Last Modified
2025-09-02
Generated
2026-05-07
AI Q&A
2025-08-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
patchstack pro_bulk_watermark_plugin 2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-35 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Path Traversal flaw in the WordPress Pro Bulk Watermark Plugin (up to version 2.0). It allows an attacker with at least subscriber-level access to manipulate file paths using sequences like '.../...//' to access restricted files or directories on the server that should normally be protected. This is categorized under broken access control and has a medium severity rating. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can allow an attacker to access sensitive or restricted files on your server, potentially exposing confidential information or configuration files. Although it does not directly impact integrity or availability, unauthorized access to files can lead to further attacks or data leakage. Since the attacker needs subscriber-level access, compromised or malicious users could exploit this flaw. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection involves monitoring for unauthorized path traversal attempts targeting the Pro Bulk Watermark Plugin for WordPress. Since the vulnerability requires at least subscriber-level access, reviewing WordPress user activity logs for suspicious subscriber actions is recommended. Additionally, server-side malware scanning is advised because plugin-based malware scanners may be unreliable. Specific commands are not provided, but professional incident response and server-side malware scanning tools should be used to detect exploitation attempts. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation includes applying the virtual patch (vPatch) released by Patchstack, which blocks attack attempts until an official update is available. It is important to implement this virtual patch promptly to prevent exploitation. Additionally, conducting professional incident response and server-side malware scanning is recommended if compromise is suspected. Since no official fix or patched version is currently available, relying on the virtual patch and monitoring is critical. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart