Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 06 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Roxnor
Roxnor emailkit – Email Customizer For Woocommerce & Wp Wordpress Wordpress wordpress |
|
| Vendors & Products |
Roxnor
Roxnor emailkit – Email Customizer For Woocommerce & Wp Wordpress Wordpress wordpress |
Tue, 05 May 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The EmailKit plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to and including 1.6.5. This is due to a flawed path traversal validation in the create_template() method of the CheckForm class, where realpath() is called on the allowed base directory (wp-content/uploads/emailkit/templates/) which may not exist, causing it to return false. In PHP 8.x, strpos($real_path, false) implicitly converts false to an empty string, and strpos() with an empty needle always returns 0, causing the check strpos(...) !== 0 to evaluate to false and bypassing the path validation entirely. This makes it possible for authenticated attackers, with Author-level access and above, to read arbitrary files from the server, including sensitive files such as wp-config.php, by supplying an absolute path to the emailkit-editor-template REST API parameter. | |
| Title | EmailKit <= 1.6.5 - Authenticated (Author+) Arbitrary File Read via 'emailkit-editor-template' REST Parameter | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-06T14:05:11.026Z
Reserved: 2026-04-09T09:01:29.056Z
Link: CVE-2026-5957
Updated: 2026-05-06T14:05:07.001Z
Status : Deferred
Published: 2026-05-05T04:16:19.643
Modified: 2026-05-05T19:08:20.090
Link: CVE-2026-5957
No data.
OpenCVE Enrichment
Updated: 2026-05-05T06:30:17Z