Open User Map Vulnerability (Medium) – CVE-2025-68002

Open User Map Vulnerability (Medium) – CVE-2025-68002

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2025-68002 is a Medium-severity vulnerability (CVSS 6.5) affecting the Open User Map WordPress plugin (slug: open-user-map) in versions up to and including 1.4.16.

The issue can be exploited by an authenticated user with Subscriber-level access or higher. That means the risk is not limited to administrators—any scenario that results in a low-privilege account (legitimate user accounts, compromised passwords, reused credentials, or automated sign-up abuse) can create an entry point.

Because the attack is performed over the network and does not require user interaction, it is well-suited to repeatable, low-effort attempts once an attacker obtains (or creates) a basic account.

Security Weakness

Wordfence reports that Open User Map is vulnerable to Path Traversal in all versions up to 1.4.16. In practical terms, this can allow an authenticated attacker to request files outside of the intended directory and read the contents of arbitrary files on the server.

This weakness matters because server files may contain sensitive information such as configuration details, internal paths, service credentials, API keys, logs, or other data that can be used to expand access and increase business impact.

Remediation is straightforward: update Open User Map to version 1.4.17 or newer, which contains the patch.

Technical or Business Impacts

The primary risk is confidentiality exposure: attackers may be able to read files that contain sensitive data. Even if the initial account is only a Subscriber, the information gained can be used for follow-on actions such as targeted phishing of staff, access to third-party systems, or deeper compromise attempts.

For marketing and executive teams, the business consequences can include brand and customer trust damage (if sensitive data is exposed), incident response costs (triage, forensics, and cleanup), and operational disruption (taking systems offline to investigate and patch).

For compliance stakeholders, unauthorized access to sensitive information can raise reporting and contractual obligations depending on what data is exposed and where your organization operates.

Recommended action: upgrade to Open User Map 1.4.17+ and review your WordPress user registration and account lifecycle controls (e.g., limiting public registrations where not needed, enforcing strong passwords, and monitoring for unusual Subscriber activity).

Reference: CVE-2025-68002 record and Wordfence advisory.

Similar Attacks

File read and path traversal issues are a common pattern in web application vulnerabilities. Here are a few well-known examples where attackers leveraged similar weaknesses to access sensitive files or data:

Drupal “Drupalgeddon 2” (CVE-2018-7600)
Apache HTTP Server path traversal (CVE-2021-41773)
Apache Tomcat “Ghostcat” file read (CVE-2020-1938)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers