CVE-2025-13801
Published: 07 January 2026
Summary
CVE-2025-13801 is a high-severity Path Traversal (CWE-22) vulnerability in Wordpress (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked in the top 1.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AU-13 (Monitoring for Information Disclosure) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates the 'file' parameter to block path traversal sequences, preventing unauthenticated arbitrary file reads.
Mandates identification, reporting, and correction of the path traversal flaw in the Yoco Payments plugin via patching.
Monitors for events indicating unauthorized information disclosure from path traversal exploitation attempts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal enables direct arbitrary local file reads (configs/logs/sensitive data) by unauthenticated remote attackers, mapping cleanly to data collection from the local system.
NVD Description
The Yoco Payments plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 3.9.0 via the file parameter. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server,…
more
which can contain sensitive information.
Deeper analysisAI
CVE-2025-13801 is a path traversal vulnerability (CWE-22) affecting the Yoco Payments plugin for WordPress in all versions up to and including 3.9.0. The flaw exists via the "file" parameter, enabling unauthenticated attackers to read the contents of arbitrary files on the affected server, which may include sensitive information. Published on 2026-01-07, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no requirements for privileges, user interaction, or scope changes.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity by crafting requests that manipulate the "file" parameter to traverse directories and access unauthorized files, such as configuration files or logs containing sensitive data. Successful exploitation results in the disclosure of arbitrary file contents without impacting integrity or availability.
Advisories and references, including Wordfence threat intelligence, highlight the vulnerable code in src/Helpers/Logs.php at lines 25 and 59 in version tag 3.8.8. Mitigation involves updating to a patched version via changeset 3434947 in the WordPress plugin repository.
Details
- CWE(s)