Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2270: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in adamskaat Countdown, Coming Soon, Maintenance – Countdown & Clock

0
High
VulnerabilityCVE-2025-2270cvecve-2025-2270cwe-22
Published: Fri Apr 04 2025 (04/04/2025, 05:22:46 UTC)
Source: CVE Database V5
Vendor/Project: adamskaat
Product: Countdown, Coming Soon, Maintenance – Countdown & Clock

Description

CVE-2025-2270 is a high-severity path traversal vulnerability in the WordPress plugin 'Countdown, Coming Soon, Maintenance – Countdown & Clock' by adamskaat, affecting all versions up to 2. 8. 9. 1. The flaw exists in the createCdObj function, allowing unauthenticated attackers to perform local file inclusion (LFI) by specifying arbitrary filenames on the server. This can lead to execution of arbitrary PHP code, bypassing access controls, and potentially full system compromise. The vulnerability requires no authentication or user interaction but has a high attack complexity. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or mitigation to prevent data breaches or server takeover. The CVSS 3.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:20:14 UTC

Technical Analysis

CVE-2025-2270 is a path traversal vulnerability classified under CWE-22, affecting the 'Countdown, Coming Soon, Maintenance – Countdown & Clock' WordPress plugin developed by adamskaat. The vulnerability resides in the createCdObj function, which improperly limits pathname inputs, allowing attackers to specify arbitrary file paths. This flaw enables Local File Inclusion (LFI), where an attacker can include and execute files on the server with specific filenames. Because the plugin processes these files as PHP, an attacker can execute arbitrary PHP code, leading to remote code execution (RCE). The vulnerability is exploitable by unauthenticated attackers over the network without user interaction, though it has a high attack complexity, likely due to the need for specific file placement or conditions on the server. The impact includes bypassing access controls, unauthorized data access, and potential full server compromise. The vulnerability affects all versions up to and including 2.8.9.1, with no patches currently linked. Despite no known exploits in the wild, the high CVSS score (8.1) indicates a critical risk to affected systems. The vulnerability is significant because WordPress is widely used globally, and this plugin is popular for site maintenance and countdown features, making many sites susceptible if unpatched.

Potential Impact

The impact of CVE-2025-2270 is substantial for organizations using the vulnerable WordPress plugin. Successful exploitation can lead to remote code execution, allowing attackers to run arbitrary PHP code on the web server. This can result in full compromise of the affected web server, including unauthorized access to sensitive data, modification or deletion of website content, and pivoting to internal networks. Confidentiality is at high risk due to potential data exposure, integrity is compromised through unauthorized code execution and data tampering, and availability can be affected if attackers disrupt services or deploy ransomware. Because the vulnerability requires no authentication and no user interaction, it can be exploited remotely by any attacker scanning for vulnerable sites. This elevates the risk of widespread automated attacks targeting WordPress sites using this plugin. Organizations relying on this plugin for critical web functions face reputational damage, regulatory penalties, and operational disruption if exploited.

Mitigation Recommendations

1. Immediate mitigation involves disabling or uninstalling the vulnerable 'Countdown, Coming Soon, Maintenance – Countdown & Clock' plugin until a secure patch is released. 2. Monitor official vendor channels and WordPress plugin repositories for updates or patches addressing CVE-2025-2270 and apply them promptly. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests attempting path traversal or local file inclusion patterns targeting the plugin endpoints. 4. Restrict file permissions on the web server to limit the ability of the web application to read or execute arbitrary files outside intended directories. 5. Conduct regular security audits and vulnerability scans on WordPress installations to identify the presence of this plugin and other vulnerable components. 6. Employ intrusion detection systems (IDS) to monitor for unusual PHP execution or file access patterns indicative of exploitation attempts. 7. Educate site administrators on the risks of using outdated plugins and enforce strict plugin update policies. 8. Consider isolating WordPress instances in segmented network environments to limit lateral movement if compromise occurs. These steps go beyond generic advice by focusing on immediate plugin management, layered defenses, and operational security controls tailored to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-12T23:49:19.036Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b21b7ef31ef0b54e696

Added to database: 2/25/2026, 9:35:29 PM

Last enriched: 2/25/2026, 10:20:14 PM

Last updated: 2/26/2026, 9:12:06 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats