← Back to CVE feed
CVE-2026-6403
Description
The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter directly to the theme root directory path without sanitizing directory traversal sequences. This makes it possible for unauthenticated attackers to trigger the creation of a ZIP archive containing arbitrary files from the server's filesystem — including wp-config.
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NReferences
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L62
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L631
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.php#L162
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.php#L248
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L62
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L631
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L162
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L248
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3514238%40quick-playground&new=3514238%40quick-playground&sfp_email=&sfph_mail=
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3523317%40quick-playground&new=3523317%40quick-playground&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a39dccb6-b635-44af-b0e0-c3010b719773?source=cve