Cyber Posture

CVE-2025-13801

High

Published: 07 January 2026

Published
07 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.5960 98.3th percentile
Risk Priority 51 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-13801 is a high-severity Path Traversal (CWE-22) vulnerability in Wordpress (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked in the top 1.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AU-13 (Monitoring for Information Disclosure) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates the 'file' parameter to block path traversal sequences, preventing unauthenticated arbitrary file reads.

prevent

Mandates identification, reporting, and correction of the path traversal flaw in the Yoco Payments plugin via patching.

detect

Monitors for events indicating unauthorized information disclosure from path traversal exploitation attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Path traversal enables direct arbitrary local file reads (configs/logs/sensitive data) by unauthenticated remote attackers, mapping cleanly to data collection from the local system.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Yoco Payments plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 3.9.0 via the file parameter. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server,…

more

which can contain sensitive information.

Deeper analysisAI

CVE-2025-13801 is a path traversal vulnerability (CWE-22) affecting the Yoco Payments plugin for WordPress in all versions up to and including 3.9.0. The flaw exists via the "file" parameter, enabling unauthenticated attackers to read the contents of arbitrary files on the affected server, which may include sensitive information. Published on 2026-01-07, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no requirements for privileges, user interaction, or scope changes.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity by crafting requests that manipulate the "file" parameter to traverse directories and access unauthorized files, such as configuration files or logs containing sensitive data. Successful exploitation results in the disclosure of arbitrary file contents without impacting integrity or availability.

Advisories and references, including Wordfence threat intelligence, highlight the vulnerable code in src/Helpers/Logs.php at lines 25 and 59 in version tag 3.8.8. Mitigation involves updating to a patched version via changeset 3434947 in the WordPress plugin repository.

Details

CWE(s)

Affected Products

Wordpress
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-54794Shared CWE-22
CVE-2025-20051Shared CWE-22
CVE-2026-41205Shared CWE-22
CVE-2026-41419Shared CWE-22
CVE-2025-24605Shared CWE-22
CVE-2025-68921Shared CWE-22
CVE-2026-39369Shared CWE-22
CVE-2025-45691Shared CWE-22
CVE-2026-23536Shared CWE-22
CVE-2025-23422Shared CWE-22

References