Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12000: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in getwpfunnels Easy WordPress Funnel Builder To Collect Leads And Increase Sales – WPFunnels

0
Medium
VulnerabilityCVE-2025-12000cvecve-2025-12000cwe-22
Published: Sat Nov 08 2025 (11/08/2025, 03:27:49 UTC)
Source: CVE Database V5
Vendor/Project: getwpfunnels
Product: Easy WordPress Funnel Builder To Collect Leads And Increase Sales – WPFunnels

Description

The WPFunnels plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wpfnl_delete_log() function in all versions up to, and including, 3.6.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:48:49 UTC

Technical Analysis

CVE-2025-12000 is a path traversal vulnerability classified under CWE-22 found in the WPFunnels plugin for WordPress, a tool designed to build sales funnels and collect leads. The vulnerability arises from insufficient validation of file paths in the wpfnl_delete_log() function, which is responsible for deleting log files. Because the plugin does not properly restrict or sanitize the file path input, an authenticated attacker with administrator privileges can manipulate the path to delete arbitrary files on the server. This can include critical WordPress files such as wp-config.php, which contains database credentials and configuration settings. Deleting such files can disrupt site availability or enable further exploitation, including remote code execution if attackers replace or manipulate files to execute malicious code. The vulnerability affects all versions up to and including 3.6.2 of WPFunnels. The attack vector requires network access and administrator-level privileges but does not require user interaction. The CVSS v3.1 base score is 6.5, reflecting medium severity due to the high impact on integrity and availability but limited by the need for high privileges. No public exploits have been reported yet, but the risk remains significant for sites using this plugin. The vulnerability was published on November 8, 2025, and no patches are currently linked, indicating that users must rely on mitigation until an official fix is released.

Potential Impact

The vulnerability enables attackers with administrator access to delete arbitrary files on the web server hosting the WordPress site. This can lead to severe consequences including site downtime, loss of critical configuration files, and potential remote code execution if attackers manage to delete or replace files that control site behavior. The integrity and availability of the affected WordPress installations are at risk. Organizations relying on WPFunnels for marketing and sales funnel management could face operational disruptions, reputational damage, and potential data loss. Since the exploit requires administrator privileges, the impact is somewhat mitigated by the need for prior compromise or insider threat. However, once exploited, the attacker gains significant control over the server environment, which could be leveraged for further attacks or lateral movement within the network.

Mitigation Recommendations

1. Restrict administrative access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit administrator activities and file system changes, especially deletions of critical files like wp-config.php. 3. Implement file integrity monitoring solutions to detect unauthorized file deletions or modifications promptly. 4. Until an official patch is released, consider disabling or uninstalling the WPFunnels plugin if it is not essential. 5. Use web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the wpfnl_delete_log() function or unusual file deletion attempts. 6. Regularly back up WordPress site files and databases to enable quick restoration in case of file deletion or site compromise. 7. Follow vendor announcements closely and apply security patches immediately once available. 8. Limit plugin capabilities by using WordPress role management plugins to ensure only necessary users have administrator privileges.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-20T21:28:29.626Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690ebeaf3a8fd010ecf64215

Added to database: 11/8/2025, 3:53:19 AM

Last enriched: 2/27/2026, 7:48:49 PM

Last updated: 3/25/2026, 1:41:52 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses