Vulnerability Description
The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter directly to the theme root directory path without sanitizing directory traversal sequences. This makes it possible for unauthenticated attackers to trigger the creation of a ZIP archive containing arbitrary files from the server's filesystem — including wp-config.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.p
- https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.p
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L62
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L631
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L1
- https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L2
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a39dccb6-b635-44af-b0e
FAQ
What is CVE-2026-6403?
CVE-2026-6403 is a vulnerability with a CVSS score of 7.5 (HIGH). The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which a...
How severe is CVE-2026-6403?
CVE-2026-6403 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-6403?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.