CVE-2025-10916: CWE-73 External Control of File Name or Path in FormGent
The FormGent WordPress plugin before 1.0.4 is vulnerable to arbitrary file deletion due to insufficient file path validation. This makes it possible for unauthenticated attackers to delete arbitrary files on the server.
AI Analysis
Technical Summary
CVE-2025-10916 is a security vulnerability identified in the FormGent WordPress plugin, affecting all versions prior to 1.0.4. The vulnerability is classified under CWE-73, which concerns external control of file names or paths. Specifically, the plugin fails to properly validate file paths supplied by users, allowing unauthenticated attackers to craft requests that delete arbitrary files on the server hosting the WordPress site. This arbitrary file deletion can lead to disruption of website functionality, loss of critical data, and potential compromise of the server environment if system files are targeted. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no public exploits have been reported yet, the nature of the flaw makes it a prime candidate for exploitation once details become widely known. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. The plugin is commonly used in WordPress environments, which are widely deployed across Europe, making this a relevant threat for European organizations relying on this plugin for form management on their websites. The vulnerability's exploitation could result in denial of service conditions or facilitate further attacks by removing security-critical files or logs.
Potential Impact
For European organizations, the impact of CVE-2025-10916 can be significant. Arbitrary file deletion can disrupt business operations by causing website downtime or loss of critical data, impacting availability and integrity. Organizations that rely on FormGent for customer-facing forms or internal workflows may experience service interruptions, damaging reputation and customer trust. In worst-case scenarios, deletion of system or security files could open pathways for further compromise or data breaches. The vulnerability's unauthenticated nature means attackers can exploit it remotely without prior access, increasing the attack surface. Given Europe's strong regulatory environment around data protection (e.g., GDPR), any disruption or data loss could also lead to compliance issues and financial penalties. Industries with high digital presence such as finance, healthcare, e-commerce, and government are particularly vulnerable due to their reliance on web services and the potential impact of service outages.
Mitigation Recommendations
To mitigate CVE-2025-10916, European organizations should immediately verify if they use the FormGent plugin and identify the version in use. Since no patch links are currently available, organizations should monitor for the release of version 1.0.4 or later and apply updates promptly. In the interim, restricting access to the plugin’s file management functionalities via web application firewalls (WAFs) or server-level access controls can reduce exposure. Implementing strict input validation and sanitization on file path parameters is critical to prevent path traversal and arbitrary file deletion. Organizations should also conduct regular backups of website data and server files to enable recovery in case of deletion. Monitoring server logs for unusual file deletion requests or anomalies can help detect exploitation attempts early. Additionally, isolating WordPress environments and running them with the least privilege necessary can limit the damage caused by successful exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-10916: CWE-73 External Control of File Name or Path in FormGent
Description
The FormGent WordPress plugin before 1.0.4 is vulnerable to arbitrary file deletion due to insufficient file path validation. This makes it possible for unauthenticated attackers to delete arbitrary files on the server.
AI-Powered Analysis
Technical Analysis
CVE-2025-10916 is a security vulnerability identified in the FormGent WordPress plugin, affecting all versions prior to 1.0.4. The vulnerability is classified under CWE-73, which concerns external control of file names or paths. Specifically, the plugin fails to properly validate file paths supplied by users, allowing unauthenticated attackers to craft requests that delete arbitrary files on the server hosting the WordPress site. This arbitrary file deletion can lead to disruption of website functionality, loss of critical data, and potential compromise of the server environment if system files are targeted. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no public exploits have been reported yet, the nature of the flaw makes it a prime candidate for exploitation once details become widely known. The lack of a CVSS score means severity must be assessed based on impact and exploitability factors. The plugin is commonly used in WordPress environments, which are widely deployed across Europe, making this a relevant threat for European organizations relying on this plugin for form management on their websites. The vulnerability's exploitation could result in denial of service conditions or facilitate further attacks by removing security-critical files or logs.
Potential Impact
For European organizations, the impact of CVE-2025-10916 can be significant. Arbitrary file deletion can disrupt business operations by causing website downtime or loss of critical data, impacting availability and integrity. Organizations that rely on FormGent for customer-facing forms or internal workflows may experience service interruptions, damaging reputation and customer trust. In worst-case scenarios, deletion of system or security files could open pathways for further compromise or data breaches. The vulnerability's unauthenticated nature means attackers can exploit it remotely without prior access, increasing the attack surface. Given Europe's strong regulatory environment around data protection (e.g., GDPR), any disruption or data loss could also lead to compliance issues and financial penalties. Industries with high digital presence such as finance, healthcare, e-commerce, and government are particularly vulnerable due to their reliance on web services and the potential impact of service outages.
Mitigation Recommendations
To mitigate CVE-2025-10916, European organizations should immediately verify if they use the FormGent plugin and identify the version in use. Since no patch links are currently available, organizations should monitor for the release of version 1.0.4 or later and apply updates promptly. In the interim, restricting access to the plugin’s file management functionalities via web application firewalls (WAFs) or server-level access controls can reduce exposure. Implementing strict input validation and sanitization on file path parameters is critical to prevent path traversal and arbitrary file deletion. Organizations should also conduct regular backups of website data and server files to enable recovery in case of deletion. Monitoring server logs for unusual file deletion requests or anomalies can help detect exploitation attempts early. Additionally, isolating WordPress environments and running them with the least privilege necessary can limit the damage caused by successful exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-09-24T14:00:49.975Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f724a6523859c72c10f9b9
Added to database: 10/21/2025, 6:13:58 AM
Last enriched: 10/21/2025, 6:14:12 AM
Last updated: 10/21/2025, 5:23:24 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-60772: n/a
UnknownCVE-2025-60511: n/a
UnknownCVE-2025-11534: CWE-288: Authentication Bypass Using an Alternate Path or Channel in Raisecomm RAX701-GC-WP-01 P200R002C52
CriticalCVE-2025-60506: n/a
UnknownCVE-2025-60500: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.