CVE-2025-68907
BaseFortify
Publication date: 2026-01-22
Last updated on: 2026-04-27
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| aivahthemes | hostme_v2 | to 7.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-68907 is an Arbitrary File Deletion vulnerability in the WordPress Hostme v2 Theme (up to version 7.0). It allows unauthenticated attackers to delete files on the affected website by exploiting a Path Traversal flaw, which means they can access and remove files outside the intended restricted directories. This can lead to the removal of core files and potentially cause the website to break or stop functioning. [1]
How can this vulnerability impact me? :
This vulnerability can have a significant impact by allowing attackers to delete important files on your website without authentication. This can result in the website breaking, losing functionality, or becoming completely unavailable. The risk is high due to the ease of exploitation and the potential damage to the website's operation. [1]
What immediate steps should I take to mitigate this vulnerability?
Users are strongly advised to apply the mitigation rule issued by Patchstack immediately to block attacks exploiting this vulnerability until an official patch becomes available. This mitigation helps protect websites from exploitation of the arbitrary file deletion vulnerability in Hostme v2 theme versions up to 7.0. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for attempts to exploit arbitrary file deletion via path traversal in the Hostme v2 WordPress theme. Since it allows unauthenticated attackers to delete files, you should look for suspicious HTTP requests containing path traversal patterns (e.g., '../') targeting the theme's endpoints. While no specific detection commands are provided, you can use web server access logs to grep for such patterns. For example, using a command like `grep -E '\.\./' /var/log/apache2/access.log` or `grep -E '\.\./' /var/log/nginx/access.log` can help identify potential exploitation attempts. Additionally, applying the mitigation rule provided by Patchstack is strongly advised to block attacks until an official patch is released. [1]