CVE-2025-15487 PUBLISHED

Code Explorer <= 1.4.6 - Authenticated (Administrator+) Arbitrary File Read via 'file' Parameter

Assigner: Wordfence
Reserved: 08.01.2026 Published: 04.02.2026 Updated: 04.02.2026

The Code Explorer plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.4.6 via the 'file' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 4.9

Product Status

Vendor qriouslad
Product Code Explorer
Versions Default: unaffected
  • affected from * to 1.4.6 (incl.)

Credits

  • Bhumividh Treloges finder

References

Problem Types

  • CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE