The Zephyr Project Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.3.203 via the `file` parameter. This makes it possible for authenticated attackers, with Custom-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. On a servers that have `allow_url_fopen` enabled, this issue allows for Server-Side Request Forgery

Project Subscriptions

Vendors Products
Dylanjkotze Subscribe
Zephyr Project Manager Subscribe
Wordpress Subscribe
Wordpress Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 17 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 17 Dec 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Dylanjkotze
Dylanjkotze zephyr Project Manager
Wordpress
Wordpress wordpress
Vendors & Products Dylanjkotze
Dylanjkotze zephyr Project Manager
Wordpress
Wordpress wordpress

Wed, 17 Dec 2025 07:30:00 +0000

Type Values Removed Values Added
Description The Zephyr Project Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.3.203 via the `file` parameter. This makes it possible for authenticated attackers, with Custom-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. On a servers that have `allow_url_fopen` enabled, this issue allows for Server-Side Request Forgery
Title Zephyr Project Manager <= 3.3.203 - Authenticated (Custom+) Arbitrary File Read And Server-Side Request Forgery
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-12-17T21:43:20.916Z

Reserved: 2025-10-29T21:34:11.697Z

Link: CVE-2025-12496

cve-icon Vulnrichment

Updated: 2025-12-17T21:43:15.575Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-17T08:15:42.787

Modified: 2025-12-18T15:08:06.237

Link: CVE-2025-12496

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-17T14:28:31Z

Weaknesses