VYPR
Medium severity4.9NVD Advisory· Published Mar 5, 2026· Updated Apr 22, 2026

CVE-2026-28078

CVE-2026-28078

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Stylemix uListing ulisting allows Path Traversal.This issue affects uListing: from n/a through <= 2.2.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Path traversal in uListing plugin ≤2.2.0 and earlier allows unauthenticated arbitrary file download, risking exposure of sensitive data.

Vulnerability

Overview

The uListing plugin for WordPress, versions 2.2.0 and earlier, contains a path traversal vulnerability (CWE-22) in its file handling functionality. The software fails to properly restrict the pathname to a restricted directory, enabling an attacker to traverse outside the intended directory structure [1]. This flaw is classified as an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal').

Exploitation

An unauthenticated attacker can exploit this vulnerability by sending crafted HTTP requests that include path traversal sequences (e.g., ../) to download arbitrary files from the server. No authentication is required, and the attack can be performed remotely over the network. The vulnerability is considered moderately dangerous because it can be used in mass-exploit campaigns targeting thousands of WordPress sites simultaneously, regardless of site traffic or popularity [1].

Impact

Successful exploitation allows an attacker to download any file from the affected WordPress installation. This includes sensitive files such as wp-config.php (which contains database credentials), backup files, and other configuration files that may expose login credentials or secret keys. The CVSS. The CVSS v3 base score is 4.9 (Medium), reflecting a medium severity but with a high potential for real-world damage due to the ease of exploitation and the value of the exposed data [1].

Mitigation

As of the publication date (2026-03-05), the vendor has not released a patched version. The recommended immediate action is to update the plugin as soon as a fix becomes available. If updating is not possible, site administrators should consult with their hosting provider or web developer to implement workarounds, such as restricting access to the vulnerable endpoint via web application firewall rules or disabling the plugin until a patch is applied [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.