Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10916: CWE-73 External Control of File Name or Path in FormGent

0
Critical
VulnerabilityCVE-2025-10916cvecve-2025-10916cwe-73
Published: Tue Oct 21 2025 (10/21/2025, 06:00:06 UTC)
Source: CVE Database V5
Product: FormGent

Description

The FormGent WordPress plugin before 1.0.4 is vulnerable to arbitrary file deletion due to insufficient file path validation. This makes it possible for unauthenticated attackers to delete arbitrary files on the server.

AI-Powered Analysis

AILast updated: 10/21/2025, 06:14:12 UTC

Technical Analysis

CVE-2025-10916 is a security vulnerability identified in the FormGent WordPress plugin, affecting all versions prior to 1.0.4. The vulnerability is classified under CWE-73, which concerns external control of file names or paths. Specifically, the plugin fails to properly validate file paths supplied by users, allowing unauthenticated attackers to craft requests that delete arbitrary files on the server hosting the WordPress site. This arbitrary file deletion can lead to disruption of website functionality, loss of critical data, and potential compromise of the server environment if system files are targeted. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no public exploits have been reported yet, the nature of the flaw makes it a prime candidate for exploitation once details become widely known. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. The plugin is commonly used in WordPress environments, which are widely deployed across Europe, making this a relevant threat for European organizations relying on this plugin for form management on their websites. The vulnerability's exploitation could result in denial of service conditions or facilitate further attacks by removing security-critical files or logs.

Potential Impact

For European organizations, the impact of CVE-2025-10916 can be significant. Arbitrary file deletion can disrupt business operations by causing website downtime or loss of critical data, impacting availability and integrity. Organizations that rely on FormGent for customer-facing forms or internal workflows may experience service interruptions, damaging reputation and customer trust. In worst-case scenarios, deletion of system or security files could open pathways for further compromise or data breaches. The vulnerability's unauthenticated nature means attackers can exploit it remotely without prior access, increasing the attack surface. Given Europe's strong regulatory environment around data protection (e.g., GDPR), any disruption or data loss could also lead to compliance issues and financial penalties. Industries with high digital presence such as finance, healthcare, e-commerce, and government are particularly vulnerable due to their reliance on web services and the potential impact of service outages.

Mitigation Recommendations

To mitigate CVE-2025-10916, European organizations should immediately verify if they use the FormGent plugin and identify the version in use. Since no patch links are currently available, organizations should monitor for the release of version 1.0.4 or later and apply updates promptly. In the interim, restricting access to the plugin’s file management functionalities via web application firewalls (WAFs) or server-level access controls can reduce exposure. Implementing strict input validation and sanitization on file path parameters is critical to prevent path traversal and arbitrary file deletion. Organizations should also conduct regular backups of website data and server files to enable recovery in case of deletion. Monitoring server logs for unusual file deletion requests or anomalies can help detect exploitation attempts early. Additionally, isolating WordPress environments and running them with the least privilege necessary can limit the damage caused by successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2025-09-24T14:00:49.975Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f724a6523859c72c10f9b9

Added to database: 10/21/2025, 6:13:58 AM

Last enriched: 10/21/2025, 6:14:12 AM

Last updated: 10/21/2025, 5:23:24 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats