CVE-2025-0818: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ninjateam File Manager Pro – Filester
Several WordPress plugins using elFinder versions 2.1.64 and prior are vulnerable to Directory Traversal in various versions. This makes it possible for unauthenticated attackers to delete arbitrary files. Successful exploitation of this vulnerability requires a site owner to explicitly make an instance of the file manager available to users.
AI Analysis
Technical Summary
CVE-2025-0818 is a medium-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This specific vulnerability affects the ninjateam File Manager Pro – Filester WordPress plugin, which integrates the elFinder file manager component. Versions 2.1.64 and prior of elFinder used in several WordPress plugins are vulnerable. The flaw allows unauthenticated attackers to perform directory traversal attacks, enabling them to delete arbitrary files on the server hosting the WordPress site. However, exploitation requires that the site owner explicitly exposes an instance of the file manager to users, meaning the vulnerability is not exploitable by default on all WordPress sites using the plugin. The CVSS 3.1 base score is 6.5, indicating a medium severity, with an attack vector of network (remote), no privileges required, no user interaction needed, but with high attack complexity. The impact affects integrity primarily, as attackers can delete files, with a low impact on availability and no impact on confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in January 2025 and published in August 2025. Given the nature of the vulnerability, it poses a significant risk to websites that expose the vulnerable file manager interface, potentially leading to data loss or disruption of website functionality through file deletion.
Potential Impact
For European organizations, especially those relying on WordPress for their web presence and using the ninjateam File Manager Pro – Filester plugin or other plugins embedding vulnerable versions of elFinder, this vulnerability could lead to unauthorized deletion of critical files. This can disrupt business operations, cause website downtime, and result in loss of data integrity. Organizations in sectors such as e-commerce, government, healthcare, and finance, which often use WordPress for content management, may face reputational damage and operational interruptions. Since the vulnerability requires the file manager to be explicitly exposed, organizations with lax security configurations or those providing file management capabilities to external users are at higher risk. The ability to delete arbitrary files without authentication could also facilitate further attacks or data destruction, impacting compliance with European data protection regulations like GDPR if personal data is affected. Although no exploits are currently known in the wild, the medium severity and ease of remote exploitation without authentication warrant proactive mitigation.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the ninjateam File Manager Pro – Filester plugin or any other plugins using elFinder versions 2.1.64 or earlier. If found, they should restrict or disable public access to any file manager interfaces until a patch is available. Implement strict access controls and authentication mechanisms around file management features to prevent unauthorized exposure. Monitoring web server logs for unusual file deletion requests or path traversal attempts can help detect exploitation attempts early. Organizations should also consider deploying Web Application Firewalls (WAFs) with custom rules to block path traversal payloads targeting the vulnerable endpoints. Regular backups of website files and databases are critical to enable recovery in case of successful exploitation. Finally, maintain close communication with plugin vendors for timely patch releases and apply updates promptly once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-0818: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ninjateam File Manager Pro – Filester
Description
Several WordPress plugins using elFinder versions 2.1.64 and prior are vulnerable to Directory Traversal in various versions. This makes it possible for unauthenticated attackers to delete arbitrary files. Successful exploitation of this vulnerability requires a site owner to explicitly make an instance of the file manager available to users.
AI-Powered Analysis
Technical Analysis
CVE-2025-0818 is a medium-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This specific vulnerability affects the ninjateam File Manager Pro – Filester WordPress plugin, which integrates the elFinder file manager component. Versions 2.1.64 and prior of elFinder used in several WordPress plugins are vulnerable. The flaw allows unauthenticated attackers to perform directory traversal attacks, enabling them to delete arbitrary files on the server hosting the WordPress site. However, exploitation requires that the site owner explicitly exposes an instance of the file manager to users, meaning the vulnerability is not exploitable by default on all WordPress sites using the plugin. The CVSS 3.1 base score is 6.5, indicating a medium severity, with an attack vector of network (remote), no privileges required, no user interaction needed, but with high attack complexity. The impact affects integrity primarily, as attackers can delete files, with a low impact on availability and no impact on confidentiality. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in January 2025 and published in August 2025. Given the nature of the vulnerability, it poses a significant risk to websites that expose the vulnerable file manager interface, potentially leading to data loss or disruption of website functionality through file deletion.
Potential Impact
For European organizations, especially those relying on WordPress for their web presence and using the ninjateam File Manager Pro – Filester plugin or other plugins embedding vulnerable versions of elFinder, this vulnerability could lead to unauthorized deletion of critical files. This can disrupt business operations, cause website downtime, and result in loss of data integrity. Organizations in sectors such as e-commerce, government, healthcare, and finance, which often use WordPress for content management, may face reputational damage and operational interruptions. Since the vulnerability requires the file manager to be explicitly exposed, organizations with lax security configurations or those providing file management capabilities to external users are at higher risk. The ability to delete arbitrary files without authentication could also facilitate further attacks or data destruction, impacting compliance with European data protection regulations like GDPR if personal data is affected. Although no exploits are currently known in the wild, the medium severity and ease of remote exploitation without authentication warrant proactive mitigation.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the ninjateam File Manager Pro – Filester plugin or any other plugins using elFinder versions 2.1.64 or earlier. If found, they should restrict or disable public access to any file manager interfaces until a patch is available. Implement strict access controls and authentication mechanisms around file management features to prevent unauthorized exposure. Monitoring web server logs for unusual file deletion requests or path traversal attempts can help detect exploitation attempts early. Organizations should also consider deploying Web Application Firewalls (WAFs) with custom rules to block path traversal payloads targeting the vulnerable endpoints. Regular backups of website files and databases are critical to enable recovery in case of successful exploitation. Finally, maintain close communication with plugin vendors for timely patch releases and apply updates promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-28T21:23:43.968Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689c0e6dad5a09ad003e38d0
Added to database: 8/13/2025, 4:02:53 AM
Last enriched: 8/13/2025, 4:18:05 AM
Last updated: 8/13/2025, 9:13:22 AM
Views: 6
Related Threats
CVE-2025-8671: CWE-404 Improper Resource Shutdown or Release in IETF HTTP Working Group HTTP/2
HighCVE-2025-48989: CWE-404 Improper Resource Shutdown or Release in Apache Software Foundation Apache Tomcat
HighCVE-2025-55280: CWE-312: Cleartext Storage of Sensitive Information in ZKTeco Co WL20 Biometric Attendance System
MediumCVE-2025-55279: CWE-798: Use of Hard-coded Credentials in ZKTeco Co WL20 Biometric Attendance System
MediumCVE-2025-54465: CWE-798: Use of Hard-coded Credentials in ZKTeco Co WL20 Biometric Attendance System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.