Skip to main content

CVE-2025-3812: CWE-73 External Control of File Name or Path in QuantumCloud WPBot Pro Wordpress Chatbot

High
VulnerabilityCVE-2025-3812cvecve-2025-3812cwe-73
Published: Sat May 17 2025 (05/17/2025, 05:30:34 UTC)
Source: CVE
Vendor/Project: QuantumCloud
Product: WPBot Pro Wordpress Chatbot

Description

The WPBot Pro Wordpress Chatbot plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the qcld_openai_delete_training_file() function in all versions up to, and including, 13.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

AILast updated: 07/11/2025, 17:47:29 UTC

Technical Analysis

CVE-2025-3812 is a critical vulnerability identified in the WPBot Pro WordPress Chatbot plugin developed by QuantumCloud. This vulnerability arises from insufficient validation of file paths in the function qcld_openai_delete_training_file(), present in all versions up to and including 13.6.2. The flaw allows authenticated users with as low as Subscriber-level privileges to perform arbitrary file deletion on the hosting server. Since WordPress Subscriber roles typically have limited capabilities, this significantly lowers the attack barrier. By deleting critical files such as wp-config.php, attackers can disrupt site functionality or facilitate remote code execution (RCE), potentially gaining full control over the server environment. The vulnerability is classified under CWE-73, which involves external control of file names or paths, leading to unauthorized file operations. The CVSS 3.1 base score is 8.1 (High), reflecting network attack vector, low attack complexity, required privileges at the low level, no user interaction, and high impact on integrity and availability but no direct confidentiality impact. Although no known exploits are currently reported in the wild, the ease of exploitation and potential damage make this a significant threat. The lack of available patches at the time of reporting increases the urgency for mitigation. This vulnerability affects all installations of the WPBot Pro plugin up to version 13.6.2, which is widely used in WordPress sites that integrate chatbot functionality.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those relying on WordPress for their web presence and using the WPBot Pro plugin. Successful exploitation can lead to deletion of critical files, causing website downtime, loss of data integrity, and potential full server compromise through remote code execution. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, particularly under GDPR where data availability and integrity are critical. Organizations in sectors such as e-commerce, government, healthcare, and finance, which often use WordPress for public-facing portals, are at heightened risk. The ability for low-privilege users to exploit this vulnerability means insider threats or compromised low-level accounts can escalate attacks. Additionally, the potential for RCE could allow attackers to deploy malware, ransomware, or pivot within internal networks, amplifying the impact beyond the web server itself.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the WPBot Pro plugin's file deletion functionality. Administrators should audit user roles and permissions to ensure that Subscriber-level accounts are tightly controlled and monitored. Until a patch is released, consider disabling or removing the WPBot Pro plugin if it is not essential. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the vulnerable function. Regularly back up critical WordPress files and server configurations to enable rapid restoration if deletion occurs. Monitoring file integrity, especially for wp-config.php and other critical files, can provide early detection of exploitation attempts. Additionally, apply the principle of least privilege across all WordPress user roles and consider multi-factor authentication to reduce the risk of account compromise. Once a vendor patch is available, prioritize prompt application of updates. Finally, conduct security awareness training for administrators and users about the risks of privilege misuse and suspicious activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-18T18:25:34.025Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb5c1

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 5:47:29 PM

Last updated: 8/2/2025, 6:31:48 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats