Description
The Loco Translate plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.8.2 via the `fsReference` AJAX route. This is due to the `findSourceFile()` method normalizing user-supplied `ref` paths containing `../` directory traversal sequences without validating that the resolved path remains within the intended bundle or content directory. This makes it possible for authenticated attackers, with Translator-level access and above (custom `loco_admin` capability required, granted to the `translator` role and administrators by default), to read arbitrary `.php`, `.js`, `.json`, and `.twig` files from the server filesystem outside the intended translation directory. Files named wp-config.php are excluded.
INFO
Published Date :
2026-05-05T02:26:59.132Z
Last Modified :
2026-05-06T12:27:43.824Z
Source :
Wordfence
AFFECTED PRODUCTS
The following products are affected by CVE-2026-1921 vulnerability.
| Vendors | Products |
|---|---|
| Timwhitlock |
|
| Wordpress |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-1921.