MEDIUM (6.7)
    Plugin

    Path Traversal Vulnerability in Loco Translate Plugin

    Published Date: 5/5/2026
    CVE ID: CVE-2026-1921

    Summary

    The Loco Translate plugin for WordPress is susceptible to a path traversal vulnerability via the `fsReference` AJAX route, allowing unauthorized file access. By exploiting this flaw, authenticated users with Translator-level access or above can traverse directories and read sensitive files on the server.

    Vulnerability Details

    The vulnerability arises from improper validation of user-specified paths in the `findSourceFile()` method of the Loco Translate plugin. When a user-supplied `ref` path contains directory traversal sequences like `../`, the function attempts to normalize the path without adequately confirming that it confines to the permitted directories. Despite the restriction against accessing `wp-config.php`, this oversight allows users with sufficient privileges, not just administrators but any role with the `loco_admin` capability (including the default Translator role), to access sensitive files such as PHP, JavaScript, JSON, and Twig files. This access can leak sensitive configuration or application logic details, posing significant security risks. Notably, this vulnerability impacts all versions of the plugin up to and including 2.8.2.

    Recommendations

    To mitigate this risk, limit the `loco_admin` capability to essential roles only, removing it from non-administrative users where possible. Consider using a Web Application Firewall (WAF) to detect and block suspicious path traversal attempts. Regularly monitor user activities for unauthorized file access patterns.

    Available Fixes

    Last Updated: 5/7/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More