CVE-2025-12529: CWE-73 External Control of File Name or Path in stylemix Cost Calculator Builder
The Cost Calculator Builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the deleteOrdersFiles() function in all versions up to, and including, 3.6.3. This makes it possible for unauthenticated attackers to inject arbitrary file paths into the orders that are removed, when an administrator deletes them. This can lead to remote code execution when the right file is deleted (such as wp-config.php). This vulnerability requires the Cost Calculator Builder Pro version to be installed along with the free version in order to be exploitable.
AI Analysis
Technical Summary
CVE-2025-12529 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the Cost Calculator Builder plugin for WordPress, developed by stylemix. The flaw exists in the deleteOrdersFiles() function, which is responsible for deleting order-related files. Due to insufficient validation of file paths, an unauthenticated attacker can inject arbitrary file paths into the orders that get deleted when an administrator performs deletion actions. This injection enables attackers to delete arbitrary files on the server, including critical WordPress configuration files such as wp-config.php. The deletion of such files can lead to remote code execution, as attackers may manipulate or remove files essential for the site's security and operation. Exploitation requires that both the free and Pro versions of the Cost Calculator Builder plugin are installed, which is a precondition for the vulnerability to be triggered. The vulnerability affects all versions up to and including 3.6.3. The CVSS v3.1 score is 8.8 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction (administrator deleting orders). The impact spans confidentiality, integrity, and availability, as arbitrary file deletion can compromise sensitive data, alter site behavior, and cause denial of service. As of the publication date, no known exploits have been observed in the wild. However, the potential for remote code execution makes this a critical concern for WordPress sites using this plugin, especially those with administrative users who manage orders regularly.
Potential Impact
For European organizations, this vulnerability poses significant risks, particularly for businesses relying on WordPress sites with the Cost Calculator Builder plugin installed. The ability for unauthenticated attackers to delete arbitrary files can lead to site downtime, data breaches, and full system compromise through remote code execution. This can disrupt e-commerce operations, damage brand reputation, and result in financial losses. Organizations handling sensitive customer data or regulated information may face compliance violations under GDPR if breaches occur. The attack does not require authentication, increasing the attack surface and risk. Since the vulnerability requires the Pro version alongside the free plugin, organizations using both are at higher risk. The impact is amplified in sectors with high reliance on online calculators for pricing or service quotes, such as finance, insurance, and retail. Recovery from such attacks may require restoring backups and conducting forensic investigations, increasing operational costs.
Mitigation Recommendations
Immediate mitigation steps include disabling or uninstalling the Cost Calculator Builder Pro plugin until a security patch is released. Administrators should avoid deleting orders via the plugin's interface if possible. Monitor file system changes, especially deletions of critical files like wp-config.php, and maintain regular, secure backups to enable rapid recovery. Implement strict file permissions on the WordPress installation to limit the plugin's ability to delete sensitive files. Employ web application firewalls (WAFs) with rules to detect and block suspicious requests targeting the plugin's endpoints. Keep WordPress core and all plugins updated, and subscribe to vendor security advisories for timely patch information. Conduct security audits focusing on file path validation and access controls. Educate administrators about the risks of deleting orders during the vulnerability window. Finally, consider isolating critical WordPress instances or using containerization to limit the blast radius of potential exploits.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12529: CWE-73 External Control of File Name or Path in stylemix Cost Calculator Builder
Description
The Cost Calculator Builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the deleteOrdersFiles() function in all versions up to, and including, 3.6.3. This makes it possible for unauthenticated attackers to inject arbitrary file paths into the orders that are removed, when an administrator deletes them. This can lead to remote code execution when the right file is deleted (such as wp-config.php). This vulnerability requires the Cost Calculator Builder Pro version to be installed along with the free version in order to be exploitable.
AI-Powered Analysis
Technical Analysis
CVE-2025-12529 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the Cost Calculator Builder plugin for WordPress, developed by stylemix. The flaw exists in the deleteOrdersFiles() function, which is responsible for deleting order-related files. Due to insufficient validation of file paths, an unauthenticated attacker can inject arbitrary file paths into the orders that get deleted when an administrator performs deletion actions. This injection enables attackers to delete arbitrary files on the server, including critical WordPress configuration files such as wp-config.php. The deletion of such files can lead to remote code execution, as attackers may manipulate or remove files essential for the site's security and operation. Exploitation requires that both the free and Pro versions of the Cost Calculator Builder plugin are installed, which is a precondition for the vulnerability to be triggered. The vulnerability affects all versions up to and including 3.6.3. The CVSS v3.1 score is 8.8 (high severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction (administrator deleting orders). The impact spans confidentiality, integrity, and availability, as arbitrary file deletion can compromise sensitive data, alter site behavior, and cause denial of service. As of the publication date, no known exploits have been observed in the wild. However, the potential for remote code execution makes this a critical concern for WordPress sites using this plugin, especially those with administrative users who manage orders regularly.
Potential Impact
For European organizations, this vulnerability poses significant risks, particularly for businesses relying on WordPress sites with the Cost Calculator Builder plugin installed. The ability for unauthenticated attackers to delete arbitrary files can lead to site downtime, data breaches, and full system compromise through remote code execution. This can disrupt e-commerce operations, damage brand reputation, and result in financial losses. Organizations handling sensitive customer data or regulated information may face compliance violations under GDPR if breaches occur. The attack does not require authentication, increasing the attack surface and risk. Since the vulnerability requires the Pro version alongside the free plugin, organizations using both are at higher risk. The impact is amplified in sectors with high reliance on online calculators for pricing or service quotes, such as finance, insurance, and retail. Recovery from such attacks may require restoring backups and conducting forensic investigations, increasing operational costs.
Mitigation Recommendations
Immediate mitigation steps include disabling or uninstalling the Cost Calculator Builder Pro plugin until a security patch is released. Administrators should avoid deleting orders via the plugin's interface if possible. Monitor file system changes, especially deletions of critical files like wp-config.php, and maintain regular, secure backups to enable rapid recovery. Implement strict file permissions on the WordPress installation to limit the plugin's ability to delete sensitive files. Employ web application firewalls (WAFs) with rules to detect and block suspicious requests targeting the plugin's endpoints. Keep WordPress core and all plugins updated, and subscribe to vendor security advisories for timely patch information. Conduct security audits focusing on file path validation and access controls. Educate administrators about the risks of deleting orders during the vulnerability window. Finally, consider isolating critical WordPress instances or using containerization to limit the blast radius of potential exploits.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-30T17:54:27.730Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692e50a4f2f793a7de7cda0c
Added to database: 12/2/2025, 2:36:20 AM
Last enriched: 12/9/2025, 4:32:32 AM
Last updated: 1/16/2026, 10:14:44 PM
Views: 81
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21223: CWE-269: Improper Privilege Management in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2026-20960: CWE-285: Improper Authorization in Microsoft Microsoft Power Apps
HighCVE-2025-56451: n/a
MediumCVE-2026-23800: CWE-266 Incorrect Privilege Assignment in Modular DS
CriticalCVE-2026-23744: CWE-306: Missing Authentication for Critical Function in MCPJam inspector
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.