WordPress Plugin Vulnerabilities

Loco Translate < 2.8.3 - Translator+ Path Traversal to Limited File Read via 'ref' Parameter

Description

The plugin is vulnerable to Path Traversal via the `fsReference` AJAX route due to the `findSourceFile()` method normalizing user-supplied `ref` paths containing `../` directory traversal sequences without validating that the resolved path remains within the intended directory. This makes it possible for authenticated attackers with Translator-level access and above (requires the `loco_admin` capability) to read arbitrary `.php`, `.js`, `.json`, and `.twig` files from the server filesystem outside the translation directory, excluding `wp-config.php`.

Affects Plugins

Fixed in 2.8.3

References

Classification

Type
LFI
OWASP top 10
CWE

Miscellaneous

Original Researcher
shark3y
Verified
No

Timeline

Publicly Published
2026-05-04 (about 10 days ago)
Added
2026-05-04 (about 9 days ago)
Last Updated
2026-05-04 (about 9 days ago)

Other