CVE-2025-6381
BaseFortify
Publication date: 2025-06-28
Last updated on: 2025-07-07
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| beeteam368 | vidmov | to 2.3.5 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-36 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Directory Traversal issue in the BeeTeam368 Extensions plugin for WordPress, affecting all versions up to 2.3.4. It occurs via the handle_remove_temp_file() function, allowing authenticated users with Subscriber-level access or higher to perform actions on files outside the intended directory. This can lead to deletion of critical files like wp-config.php, potentially enabling a full site takeover.
How can this vulnerability impact me? :
An attacker with at least Subscriber-level access can exploit this vulnerability to delete important files such as wp-config.php, which can result in a complete takeover of the WordPress site. This compromises the site's confidentiality, integrity, and availability.