CVE-2026-1921

Published: Mag 05, 2026 Last Modified: Mag 05, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 4,9
Attack Vector: network
Attack Complexity: low
Privileges Required: high
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: none
Availability: none

Description

AI Translation Available

The Loco Translate plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.8.2 via the `fsReference` AJAX route. This is due to the `findSourceFile()` method normalizing user-supplied `ref` paths containing `../` directory traversal sequences without validating that the resolved path remains within the intended bundle or content directory. This makes it possible for authenticated attackers, with Translator-level access and above (custom `loco_admin` capability required, granted to the `translator` role and administrators by default), to read arbitrary `.php`, `.js`, `.json`, and `.twig` files from the server filesystem outside the intended translation directory. Files named wp-config.php are excluded.

22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Stable
Common Consequences
Security Scopes Affected:
Integrity Confidentiality Availability
Potential Impacts:
Execute Unauthorized Code Or Commands Modify Files Or Directories Read Files Or Directories Dos: Crash, Exit, Or Restart
Applicable Platforms
Technologies: AI/ML
View CWE Details
https://plugins.trac.wordpress.org/browser/loco-translate/tags/2.8.1/src/ajax/F…
https://plugins.trac.wordpress.org/browser/loco-translate/tags/2.8.1/src/ajax/F…
https://plugins.trac.wordpress.org/browser/loco-translate/trunk/src/ajax/FsRefe…
https://plugins.trac.wordpress.org/browser/loco-translate/trunk/src/ajax/FsRefe…
https://plugins.trac.wordpress.org/changeset/3482475/loco-translate/trunk/tpl/a…
https://plugins.trac.wordpress.org/changeset?old_path=%2Floco-translate/tags/2.…
https://www.wordfence.com/threat-intel/vulnerabilities/id/f9ff3058-a08c-40ed-b7…