Skip to main content

CVE-2025-39491: CWE-35 Path Traversal in WHMPress WHMpress

High
VulnerabilityCVE-2025-39491cvecve-2025-39491cwe-35
Published: Fri May 16 2025 (05/16/2025, 15:45:26 UTC)
Source: CVE
Vendor/Project: WHMPress
Product: WHMpress

Description

Path Traversal vulnerability in WHMPress WHMpress allows Path Traversal. This issue affects WHMpress: from 6.2 through revision.

AI-Powered Analysis

AILast updated: 07/04/2025, 16:55:41 UTC

Technical Analysis

CVE-2025-39491 is a high-severity path traversal vulnerability identified in WHMPress, a WordPress plugin designed to integrate WHM/cPanel hosting management features into WordPress sites. The vulnerability affects WHMPress version 6.2 and potentially subsequent revisions until patched. Path traversal (CWE-35) vulnerabilities allow an attacker to manipulate file path inputs to access files and directories outside the intended scope, potentially exposing sensitive system or application files. This vulnerability is remotely exploitable over the network (AV:N), but requires high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The CVSS 3.1 base score is 8.1, indicating a high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Exploiting this flaw could allow an attacker to read arbitrary files on the server, modify files, or disrupt service, depending on the server configuration and permissions. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a significant risk for affected installations. The lack of available patches at the time of publication increases the urgency for mitigation. WHMPress is commonly used by hosting providers and web administrators to display hosting account information and automate billing or management tasks within WordPress, making it a valuable target for attackers seeking to compromise hosting infrastructure or customer data.

Potential Impact

For European organizations, especially web hosting providers, managed service providers, and enterprises using WHMPress to integrate hosting management into their WordPress sites, this vulnerability poses a critical risk. Exploitation could lead to unauthorized disclosure of sensitive configuration files, customer data, or credentials stored on the server. This could result in data breaches, loss of customer trust, regulatory non-compliance (e.g., GDPR violations), and potential service outages if attackers modify or delete critical files. Given the interconnected nature of hosting environments, a successful attack could also serve as a pivot point for further lateral movement within the network, amplifying the impact. The high confidentiality, integrity, and availability impacts mean that affected organizations could face severe operational disruptions and financial losses. Additionally, European organizations are subject to strict data protection regulations, and a breach stemming from this vulnerability could trigger significant legal and reputational consequences.

Mitigation Recommendations

Organizations should immediately audit their WordPress environments to identify installations of WHMPress version 6.2 or affected revisions. Until an official patch is released, the following specific mitigations are recommended: 1) Restrict access to the WordPress admin and plugin directories via web server configuration or firewall rules to trusted IP addresses only. 2) Implement Web Application Firewall (WAF) rules to detect and block path traversal attack patterns targeting WHMPress endpoints. 3) Review and tighten file system permissions to ensure the web server user has the minimum necessary access, preventing unauthorized file reads or writes outside the intended directories. 4) Monitor server logs for unusual file access attempts or errors indicative of path traversal exploitation attempts. 5) Consider temporarily disabling or uninstalling the WHMPress plugin if it is not critical to operations until a patch is available. 6) Stay informed via vendor advisories and security bulletins for the release of official patches and apply them promptly. 7) Conduct penetration testing focused on path traversal vectors to validate the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-04-16T06:23:58.700Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebd45

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/4/2025, 4:55:41 PM

Last updated: 7/27/2025, 12:35:41 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats