PatchSiren cyber security CVE debrief
CVE-2018-25326 Unknown Vendor CVE debrief
CVE-2018-25326 is a high-severity path traversal vulnerability affecting Google Drive for WordPress 2.2. According to the supplied record, unauthenticated attackers can abuse the gdrive-ajaxs.php endpoint with crafted file_name input to traverse directories and read arbitrary files, including sensitive configuration files such as wp-config.php.
- Vendor
- Unknown Vendor
- Product
- Unknown
- CVSS
- HIGH 8.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-17
- Original CVE updated
- 2026-05-18
- Advisory published
- 2026-05-17
- Advisory updated
- 2026-05-18
Who should care
WordPress site owners running Google Drive for WordPress 2.2, administrators responsible for plugin inventory and patching, and security teams monitoring exposed WordPress endpoints should prioritize this issue.
Technical summary
The supplied NVD-derived description indicates improper path handling in the plugin’s file_name parameter. By sending a POST request to gdrive-ajaxs.php with ajaxstype set to del_fl_bkp and a traversal payload in file_name, an attacker may escape the intended directory and read files outside the plugin’s expected scope. The weakness is classified as CWE-22 (Path Traversal).
Defensive priority
High. The vulnerability is unauthenticated, remotely reachable, and can expose sensitive configuration data that may lead to broader compromise if exploited.
Recommended defensive actions
- Identify whether Google Drive for WordPress 2.2 is installed on any public or internal WordPress instance.
- Restrict or remove the affected plugin if it is not required.
- Apply a vendor fix or upgrade to a non-vulnerable version if one is available from the plugin maintainer.
- Review web logs for requests to gdrive-ajaxs.php and unusual file_name values containing traversal sequences.
- Treat exposure of wp-config.php or similar files as a potential incident and rotate secrets if sensitive data may have been disclosed.
- Harden file access controls and validate all request parameters in custom or third-party WordPress plugins.
Evidence notes
The supplied corpus ties this CVE to NVD’s modified record and lists reference URLs for lenonleite.com.br, Exploit-DB, and a VulnCheck advisory. The description in the prompt provides the core technical detail: unauthenticated path traversal through gdrive-ajaxs.php using ajaxstype=del_fl_bkp and a crafted file_name parameter. Vendor attribution is uncertain in the supplied data; the vendor field is marked low-confidence and should be treated cautiously.
Official resources
Publicly disclosed through the referenced advisory material and third-party references in the supplied record. No CISA KEV entry is provided in the supplied data.