Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13377: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in 10web 10Web Booster – Website speed optimization, Cache & Page Speed optimizer

0
Critical
VulnerabilityCVE-2025-13377cvecve-2025-13377cwe-22
Published: Sat Dec 06 2025 (12/06/2025, 06:39:09 UTC)
Source: CVE Database V5
Vendor/Project: 10web
Product: 10Web Booster – Website speed optimization, Cache & Page Speed optimizer

Description

The 10Web Booster – Website speed optimization, Cache & Page Speed optimizer plugin for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the get_cache_dir_for_page_from_url() function in all versions up to, and including, 2.32.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary folders on the server, which can easily lead to a loss of data or a denial of service condition.

AI-Powered Analysis

AILast updated: 12/13/2025, 07:08:20 UTC

Technical Analysis

The vulnerability CVE-2025-13377 affects the 10Web Booster plugin for WordPress, a popular tool for website speed optimization and caching. The root cause is improper limitation of a pathname to a restricted directory (CWE-22), specifically in the get_cache_dir_for_page_from_url() function. This function fails to adequately validate or sanitize file paths, allowing an authenticated attacker with as low as Subscriber-level privileges to craft requests that traverse directories and delete arbitrary folders on the server. This can lead to deletion of critical website files or cache directories, causing data loss or denial of service conditions. The vulnerability affects all plugin versions up to 2.32.7, and no user interaction is required beyond authentication. The CVSS 3.1 base score is 9.6, reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and a scope change with high impact on integrity and availability. Although no exploits are publicly known, the ease of exploitation and potential damage make this a critical threat. The vulnerability is particularly dangerous because it allows attackers to escalate damage from a low-privilege account, which is common on WordPress sites where many users have Subscriber roles. The lack of a patch at the time of publication means organizations must implement interim mitigations to protect their environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to website availability and data integrity. Many businesses, including e-commerce, media, and service providers, rely on WordPress and plugins like 10Web Booster to optimize site performance. Exploitation could result in deletion of cache or other critical folders, leading to website downtime, loss of customer trust, and potential revenue loss. Since the attack requires only Subscriber-level access, attackers could leverage compromised or malicious user accounts to cause damage without needing administrative credentials. This increases the attack surface, especially for organizations with large user bases or weak user management policies. Additionally, denial of service caused by folder deletion could disrupt business operations and impact compliance with data availability requirements under regulations like GDPR. The integrity impact may also affect content accuracy and reliability, further damaging organizational reputation.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the 10Web Booster plugin and its version. Until an official patch is released, restrict Subscriber-level user capabilities to minimize the risk of exploitation, such as disabling file management or deletion permissions. Implement Web Application Firewall (WAF) rules to detect and block suspicious path traversal patterns targeting the vulnerable function. Monitor logs for unusual deletion activities or access patterns related to cache directories. Employ strict file system permissions to prevent the web server user from deleting critical directories outside intended cache folders. Regularly back up website data and cache directories to enable rapid restoration in case of an attack. Once a patch is available, prioritize immediate update of the plugin. Additionally, consider isolating WordPress instances or running them in containerized environments to limit the blast radius of potential exploits.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-18T19:31:43.901Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6933d18711163305effc5a0a

Added to database: 12/6/2025, 6:47:35 AM

Last enriched: 12/13/2025, 7:08:20 AM

Last updated: 1/20/2026, 6:29:00 PM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats