CVE-2026-6403
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
15/05/2026
Last modified:
15/05/2026
Description
The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter directly to the theme root directory path without sanitizing directory traversal sequences. This makes it possible for unauthenticated attackers to trigger the creation of a ZIP archive containing arbitrary files from the server's filesystem — including wp-config.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
References to Advisories, Solutions, and Tools
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L62
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L631
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.php#L162
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.php#L248
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L62
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L631
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L162
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L248
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3514238%40quick-playground&new=3514238%40quick-playground&sfp_email=&sfph_mail=
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3523317%40quick-playground&new=3523317%40quick-playground&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a39dccb6-b635-44af-b0e0-c3010b719773?source=cve



