CVE-2026-6403

high

Description

The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter directly to the theme root directory path without sanitizing directory traversal sequences. This makes it possible for unauthenticated attackers to trigger the creation of a ZIP archive containing arbitrary files from the server's filesystem — including wp-config.

References

https://www.wordfence.com/threat-intel/vulnerabilities/id/a39dccb6-b635-44af-b0e0-c3010b719773?source=cve

https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3523317%40quick-playground&new=3523317%40quick-playground&sfp_email=&sfph_mail=

https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3514238%40quick-playground&new=3514238%40quick-playground&sfp_email=&sfph_mail=

https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L248

https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L162

https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L631

https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L62

https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.php#L248

https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.php#L162

https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L631

https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L62

Details

Source: Mitre, NVD

Published: 2026-05-15

Updated: 2026-05-15

Risk Information

CVSS v2

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Severity: High

CVSS v3

Base Score: 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: High

EPSS

EPSS: 0.00267