VYPR
Medium severity6.5NVD Advisory· Published Aug 29, 2025· Updated Apr 15, 2026

CVE-2025-9217

CVE-2025-9217

Description

The Slider Revolution plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.7.36 via the 'used_svg' and 'used_images' parameters. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Path traversal in Slider Revolution plugin for WordPress allows authenticated contributors to read arbitrary files.

Vulnerability

Overview

The Slider Revolution plugin for WordPress is vulnerable to a Path Traversal attack in versions up to and including 6.7.36. The flaw exists in the handling of the 'used_svg' and 'used_images' parameters, allowing authenticated attackers with Contributor-level access or higher to read the contents of arbitrary files on the server [1]. This is a classic path traversal vulnerability where user-supplied input is not properly sanitized, enabling directory traversal sequences.

Exploitation

An attacker must have at least Contributor-level access to the WordPress instance, which requires authentication. The attack is performed by manipulating the 'used_svg' or 'used_images' parameters to include path traversal sequences like '../' to navigate outside the intended directory. This leads to reading sensitive files such as wp-config.php, which may contain database credentials and other secrets [1].

Impact

Successful exploitation allows an attacker to read arbitrary files on the server, potentially exposing sensitive information including database credentials, API keys, and other configuration data. This could lead to further compromise of the WordPress installation and connected systems [1].

Mitigation

The vulnerability has been patched in version 6.7.37 of the plugin. Users are strongly advised to update to the latest version immediately. The changelog confirms that version 6.7.37 addresses this issue [1]. No workarounds are mentioned, so updating is the recommended mitigation.

References
  1. Changelog

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.