First published: Thu Apr 24 2025(Updated: )
The WPMasterToolKit (WPMTK) – All in one plugin plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.5.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to read and modify the contents of arbitrary files on the server, which can contain sensitive information.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPMasterToolKit | <=2.5.2 | |
WordPress All in One Plugin | <=2.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3300 is considered a critical vulnerability due to its potential for authenticated attackers to exploit it for directory traversal.
To fix CVE-2025-3300, upgrade the WPMasterToolKit plugin to version 2.5.3 or later.
CVE-2025-3300 affects all versions of the WPMasterToolKit plugin for WordPress up to and including version 2.5.2.
CVE-2025-3300 can be exploited by authenticated users with Administrator-level access to read and modify files on the server.
Yes, CVE-2025-3300 can be easily exploited by attackers with sufficient privileges due to the lack of proper input validation.