CVE-2026-24953
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Mitchell Bennis Simple File List simple-file-list allows Path Traversal.This issue affects Simple File List: from n/a through <= 6.1.15.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated path traversal in Simple File List (≤6.1.15) allows attackers to download arbitrary files from a WordPress site.
Vulnerability
Overview The Simple File List plugin for WordPress, versions 6.1.15 and earlier, contains a path traversal vulnerability (CWE-22) in its file download functionality. The plugin fails to properly restrict the pathname to a restricted directory, allowing an attacker to traverse outside the intended file directory [1]. This is classified as an Improper Limitation of a Pathname to a Restricted Directory vulnerability.
Exploitation
Details The vulnerability can be exploited remotely without authentication, making it accessible to any unauthenticated attacker. By crafting a malicious request that includes path traversal sequences (e.g., ../), an attacker can escape the plugin's intended file access boundaries and request any file on the server's filesystem [1]. Typical attack campaigns exploit this vulnerability in mass, targeting thousands of websites regardless of their size or popularity.
Impact
Successful exploitation allows an attacker to download arbitrary files from the affected WordPress site. This includes sensitive files such as wp-config.php (which contains database credentials and authentication keys), other PHP files, or any file the web server process can read. The CVSS v3.1 score is 6.5 (Medium), but the advisory notes that this type of vulnerability is frequently leveraged in mass-exploit campaigns [1].
Mitigation
The vulnerability is patched in version 6.1.16 of Simple File List. Users are strongly advised to update immediately. The advisory also notes that Patchstack has issued a mitigation rule to block attacks for those who cannot update right away [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=6.1.15
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.