Description
The FastDup – Fastest WordPress Migration & Duplicator plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.7 via the 'dir_path' parameter in the 'njt-fastdup/v1/template/directory-tree' REST API endpoint. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary directories on the server, which can contain sensitive information.
Problem types
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
* (semver)
Timeline
| 2025-12-11: | Vendor Notified |
| 2026-01-05: | Disclosed |
Credits
Athiwat Tiprasaharn
References
www.wordfence.com/...-4c75-429b-bbf2-27ca322be1cf?source=cve
plugins.trac.wordpress.org/...ludes/Endpoint/TemplateApi.php
plugins.trac.wordpress.org/...ludes/Endpoint/TemplateApi.php
plugins.trac.wordpress.org/...0fastdup&sfp_email=&sfph_mail=