CVE-2025-8213
BaseFortify
Publication date: 2025-07-31
Last updated on: 2025-07-31
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | ninjascanner | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-36 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the NinjaScanner β Virus & Malware scan plugin for WordPress, where insufficient file path validation in certain functions ('nscan_ajax_quarantine' and 'nscan_quarantine_select') allows authenticated users with Administrator-level access or higher to delete arbitrary files on the server, including files outside the WordPress root directory.
How can this vulnerability impact me? :
An attacker with Administrator-level access can exploit this vulnerability to delete any file on the server, potentially causing data loss, service disruption, or compromising the integrity and availability of the website and server.