CVE-2025-6379
BaseFortify
Publication date: 2025-06-28
Last updated on: 2025-07-07
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| beeteam368 | vidmov | to 2.3.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Directory Traversal issue in the BeeTeam368 Extensions Pro plugin for WordPress, affecting all versions up to 2.3.4. It occurs via the handle_live_fn() function, allowing authenticated users with Subscriber-level access or higher to access and perform actions on files outside the intended directory. This can include deleting critical files like wp-config.php, potentially leading to a full site takeover.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker with low-level authenticated access to delete important files such as wp-config.php, which can result in a complete takeover of the WordPress site. This can lead to loss of data, site downtime, unauthorized control, and potential further exploitation.