High severity7.5NVD Advisory· Published May 15, 2026· Updated May 15, 2026
CVE-2026-6403
CVE-2026-6403
Description
The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter directly to the theme root directory path without sanitizing directory traversal sequences. This makes it possible for unauthenticated attackers to trigger the creation of a ZIP archive containing arbitrary files from the server's filesystem — including wp-config.
Affected products
1- Range: <=1.3.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
11- plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.phpnvd
- plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.phpnvd
- plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.phpnvd
- plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.phpnvd
- plugins.trac.wordpress.org/browser/quick-playground/trunk/api.phpnvd
- plugins.trac.wordpress.org/browser/quick-playground/trunk/api.phpnvd
- plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.phpnvd
- plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/a39dccb6-b635-44af-b0e0-c3010b719773nvd
News mentions
1- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 6, 2026 to April 12, 2026)Wordfence Blog · Apr 16, 2026