VYPR
Medium severity6.5NVD Advisory· Published Feb 20, 2026· Updated Apr 15, 2026

CVE-2025-68002

CVE-2025-68002

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in 100plugins Open User Map open-user-map allows Path Traversal.This issue affects Open User Map: from n/a through <= 1.4.16.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Path traversal vulnerability in Open User Map plugin versions <=1.4.16 allows unauthenticated arbitrary file download, risking exposure of sensitive data; update to 1.4.17.

The Open User Map plugin for WordPress versions 1.4.16 and below contains a path traversal vulnerability, identified as CVE-2025-68002. The plugin fails to properly restrict file paths, allowing an attacker to traverse directories and access files outside the intended scope [1].

Exploitation requires no authentication and can be performed over the network with low complexity. Attackers can craft requests to download arbitrary files from the server, including configuration files containing database credentials, backup files, or other sensitive data [1].

The impact is significant: an attacker can extract login credentials, access keys, or other secrets, potentially leading to full site compromise. Given the ease of exploitation and the value of stolen data, this vulnerability is expected to be used in mass exploitation campaigns targeting thousands of WordPress sites [1].

As a mitigation, users should update the plugin to version 1.4.17 or later, which patches the vulnerability. Patchstack has released a virtual mitigation rule to block attacks until the update is applied [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

1