Malformed BRID/HHIT records can cause `named` to terminate unexpectedly
Description
Malformed BRID/HHIT records can cause `named` to terminate unexpectedly
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity Path Traversal vulnerability has been identified in the Yoco Payments plugin for WordPress. This flaw could allow an unauthenticated attacker to read sensitive files from the server, potentially exposing confidential data such as database credentials, system configuration files, and user information. Successful exploitation could lead to a complete compromise of the affected website and underlying server.
Vulnerability Details
CVE-ID: CVE-2025-13801
Affected Software: Yoco Payments plugin for WordPress
Affected Versions: All versions up to, and including, 3
Vulnerability: The Yoco Payments plugin is vulnerable to Path Traversal, also known as Directory Traversal. This occurs because the plugin does not properly validate user-supplied input before using it in a file path. An attacker can exploit this by crafting a malicious request containing "dot-dot-slash" (
../) sequences to navigate outside of the intended web root directory and access arbitrary files on the server's filesystem, limited only by the web server's file permissions.Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Exploitation could have a significant business impact, including the unauthorized disclosure of sensitive information. An attacker could potentially read the
wp-config.phpfile to steal database credentials, leading to a full database compromise. The exposure of customer data, internal documents, or system passwords could result in severe reputational damage, financial loss, and potential regulatory penalties for non-compliance with data protection standards.Remediation Plan
Immediate Action: Immediately update the Yoco Payments plugin to the latest available version (greater than version 3) which addresses this vulnerability. If the plugin is not essential for business operations, consider deactivating and removing it to eliminate the attack surface.
Proactive Monitoring: Monitor web server access logs for requests containing directory traversal patterns (e.g.,
../,..%2f,%2e%2e%2f) targeting the Yoco Payments plugin's endpoints. Implement a Web Application Firewall (WAF) with rules specifically designed to detect and block path traversal attempts. Monitor for unusual file access activity by the web server user account.Compensating Controls: If immediate patching is not feasible, implement the following controls:
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 8, 2026, there are no known public exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, due to the straightforward nature of path traversal vulnerabilities, proof-of-concept exploits could be developed easily.
Analyst Recommendation
Given the high severity score (CVSS 7.5) and the potential for sensitive data exposure, it is strongly recommended that organizations patch this vulnerability with the highest priority. Although there is no evidence of active exploitation, the risk of compromise is significant. Organizations should immediately apply the vendor-supplied update and conduct a review of all installed WordPress plugins to ensure they are necessary, up-to-date, and properly configured.