WordPress Plugin Vulnerabilities
Loco Translate < 2.8.3 - Translator+ Path Traversal to Limited File Read via 'ref' Parameter
Description
The plugin is vulnerable to Path Traversal via the `fsReference` AJAX route due to the `findSourceFile()` method normalizing user-supplied `ref` paths containing `../` directory traversal sequences without validating that the resolved path remains within the intended directory. This makes it possible for authenticated attackers with Translator-level access and above (requires the `loco_admin` capability) to read arbitrary `.php`, `.js`, `.json`, and `.twig` files from the server filesystem outside the translation directory, excluding `wp-config.php`.
Affects Plugins
References
Classification
Type
LFI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
shark3y
Verified
No
WPVDB ID
Timeline
Publicly Published
2026-05-04 (about 10 days ago)
Added
2026-05-04 (about 9 days ago)
Last Updated
2026-05-04 (about 9 days ago)