Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3812: CWE-73 External Control of File Name or Path in QuantumCloud WPBot Pro Wordpress Chatbot

0
High
VulnerabilityCVE-2025-3812cvecve-2025-3812cwe-73
Published: Sat May 17 2025 (05/17/2025, 05:30:34 UTC)
Source: CVE
Vendor/Project: QuantumCloud
Product: WPBot Pro Wordpress Chatbot

Description

The WPBot Pro Wordpress Chatbot plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the qcld_openai_delete_training_file() function in all versions up to, and including, 13.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:53:20 UTC

Technical Analysis

CVE-2025-3812 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the WPBot Pro WordPress Chatbot plugin developed by QuantumCloud. The issue lies in the qcld_openai_delete_training_file() function, which fails to properly validate file paths before deleting files. This flaw allows authenticated attackers with as low as Subscriber-level privileges to specify arbitrary file paths for deletion on the server hosting the WordPress site. Since WordPress Subscriber roles are commonly assigned to registered users with minimal permissions, this significantly lowers the barrier to exploitation. The arbitrary file deletion can target critical WordPress files such as wp-config.php, which contains database credentials and configuration settings. Deleting or tampering with such files can lead to site disruption and enable remote code execution by attackers who can then upload malicious code or manipulate site behavior. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication. It affects all versions of WPBot Pro up to 13.6.2. The CVSS v3.1 base score is 8.1, reflecting high severity with network attack vector, low attack complexity, and privileges required but no user interaction. Although no public exploits are currently known, the vulnerability's nature and impact make it a critical concern for WordPress sites using this plugin. The lack of available patches at the time of publication further increases risk, necessitating immediate mitigation steps.

Potential Impact

The impact of CVE-2025-3812 is substantial for organizations running WordPress sites with the WPBot Pro plugin installed. Successful exploitation allows attackers to delete arbitrary files on the web server, compromising the integrity and availability of the website. Critical files like wp-config.php can be deleted, potentially causing site outages and enabling attackers to gain remote code execution capabilities. This can lead to full site compromise, data breaches, defacement, or use of the site as a pivot point for further attacks within the network. Since the vulnerability requires only Subscriber-level authentication, attackers can exploit it by registering or compromising low-privilege accounts, increasing the attack surface. Organizations relying on WordPress for business operations, e-commerce, or content delivery face risks of downtime, reputational damage, and data loss. The vulnerability also poses a risk to hosting providers and managed WordPress services that may have multiple clients using the vulnerable plugin. The absence of known exploits currently provides a window for proactive defense, but the high severity score indicates urgent remediation is necessary to prevent exploitation.

Mitigation Recommendations

To mitigate CVE-2025-3812, organizations should immediately upgrade the WPBot Pro plugin to a version where the vulnerability is patched once available. Until a patch is released, implement strict access controls to limit Subscriber-level account creation and monitor for suspicious activity from low-privilege users. Employ web application firewalls (WAFs) with custom rules to detect and block requests attempting to delete files via the vulnerable function. Disable or restrict the plugin if feasible, especially on sites where Subscriber accounts are common or untrusted. Conduct thorough audits of user accounts and remove or restrict unnecessary Subscriber roles. Regularly back up critical WordPress files and databases to enable rapid recovery in case of file deletion. Monitor server and application logs for unusual file deletion attempts or errors related to wp-config.php or other critical files. Consider deploying file integrity monitoring solutions to alert on unauthorized changes or deletions. Engage with the plugin vendor or community to track patch releases and vulnerability disclosures. Finally, educate site administrators and developers about the risks of insufficient input validation and the importance of least privilege principles.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-18T18:25:34.025Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb5c1

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 2/27/2026, 1:53:20 PM

Last updated: 3/24/2026, 9:02:39 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses