Directory Listings WordPress plugin – uListing Vulnerability (Mediu…

Directory Listings WordPress plugin – uListing Vulnerability (Mediu…

by | Mar 5, 2026 | Plugins

Attack Vectors

CVE-2026-28078 affects the Directory Listings WordPress plugin – uListing (slug: ulisting) in versions up to and including 2.2.0. This is a Medium-severity issue (CVSS 4.9) that requires an authenticated user with Editor-level access or higher to exploit.

In practical terms, the primary attack vector is account misuse: an attacker who gains access to an Editor (or higher) WordPress account—through stolen credentials, password reuse, phishing, or a compromised internal user—could attempt to download arbitrary files from the server by abusing a directory traversal weakness.

Security Weakness

The underlying weakness is a directory traversal flaw in uListing (<= 2.2.0) that can allow an authenticated Editor+ user to read files outside of intended directories. This can expose sensitive server-side information if the vulnerable functionality can be reached and used as described in the advisory.

Because there is currently no known patch available, the risk is not simply “upgrade and move on.” It becomes a governance decision: whether to accept the risk, restrict who can reach the vulnerable functionality, or remove the plugin entirely.

Technical or Business Impacts

The key impact is confidentiality: arbitrary file reads can expose sensitive information stored on the server. Depending on what files are accessible, this could include configuration details, operational data, or other information that increases downstream risk.

For business leaders and compliance teams, this can translate into increased likelihood of data exposure, heightened audit and regulatory scrutiny, and incident response costs. Even without evidence of data loss, investigations, external notifications (where required), and brand trust impacts can become material—especially if the affected WordPress site supports lead generation, customer portals, or regulated workflows.

Recommended actions (given “no known patch”): review where and why uListing is used, reduce Editor+ access to only essential personnel, strengthen account security for privileged users, and consider uninstalling the affected plugin and replacing it based on your organization’s risk tolerance and business continuity requirements. Reference details: CVE-2026-28078 and the source advisory from Wordfence.

Similar Attacks

Directory traversal and arbitrary file read issues are a recurring pattern across web software, often leading to sensitive data exposure when attackers can access configuration or credential-bearing files. Public examples include:

CVE-2021-41773 (Apache HTTP Server path traversal)

CVE-2018-7600 (Drupalgeddon 2)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers