The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter directly to the theme root directory path without sanitizing directory traversal sequences. This makes it possible for unauthenticated attackers to trigger the creation of a ZIP archive containing arbitrary files from the server's filesystem — including wp-config.
Metrics
Affected Vendors & Products
References
History
Fri, 15 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Davidfcarr
Davidfcarr quick Playground Wordpress Wordpress wordpress |
|
| Vendors & Products |
Davidfcarr
Davidfcarr quick Playground Wordpress Wordpress wordpress |
Fri, 15 May 2026 09:00:00 +0000
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-15T07:46:38.191Z
Reserved: 2026-04-15T20:36:14.670Z
Link: CVE-2026-6403
No data.
Status : Received
Published: 2026-05-15T09:16:16.973
Modified: 2026-05-15T09:16:16.973
Link: CVE-2026-6403
No data.
OpenCVE Enrichment
Updated: 2026-05-15T11:30:43Z