CVE-2025-13801
HIGH NUCLEIYoco Payments <3.8.8 - Path Traversal
Title source: llmDescription
The Yoco Payments plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 3.9.0 via the file parameter. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
Nuclei Templates (1)
Yoco Payments <= 3.8.8 - Path Traversal
HIGHVERIFIEDby 0x_Akoko
Shodan:
http.html:"yoco-payment-gateway"
FOFA:
body="yoco-payment-gateway"
References (4)
Scores
CVSS v3
7.5
EPSS
0.6466
EPSS Percentile
98.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-22
Status
published
Products (2)
yocoadmin/Yoco Payments
< 3.8.8
yocoadmin/Yoco Payments
< 3.9.0
Published
Jan 07, 2026
Tracked Since
Feb 18, 2026