CVE-2025-4564: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in facturaone TicketBAI Facturas para WooCommerce
The TicketBAI Facturas para WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation via the 'delpdf' action in all versions up to, and including, 3.18. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI Analysis
Technical Summary
CVE-2025-4564 is a critical security vulnerability identified in the TicketBAI Facturas para WooCommerce plugin for WordPress, affecting all versions up to and including 3.18. This vulnerability is classified as CWE-22, which relates to improper limitation of a pathname to a restricted directory, commonly known as a path traversal flaw. The issue arises from insufficient validation of file paths in the 'delpdf' action, allowing unauthenticated attackers to craft requests that can delete arbitrary files on the server hosting the WordPress site. Because no authentication or user interaction is required, the attack surface is broad and easily exploitable remotely over the network. The ability to delete arbitrary files can lead to severe consequences, including the deletion of critical WordPress configuration files such as wp-config.php. Such deletions can disrupt the availability of the website or, more dangerously, enable attackers to execute remote code by manipulating the environment or triggering fallback behaviors. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network vector, no privileges required, no user interaction). Although no known exploits are reported in the wild yet, the severity and simplicity of exploitation make this vulnerability a high priority for patching and mitigation. The lack of available patches at the time of disclosure further increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, especially those using WordPress with the TicketBAI Facturas para WooCommerce plugin, this vulnerability poses a significant risk. The arbitrary file deletion can lead to website defacement, downtime, data loss, and potential remote code execution, which could compromise the entire web server and connected internal networks. Given that WooCommerce is widely used for e-commerce across Europe, including small and medium enterprises that may rely on this plugin for invoicing and compliance with local tax regulations (such as TicketBAI in Spain), the impact could disrupt business operations and customer trust. Additionally, compromise of financial or personal data processed through these platforms could lead to violations of GDPR, resulting in legal and financial penalties. The vulnerability could also be leveraged as an entry point for broader attacks, including lateral movement within corporate networks or deployment of ransomware, amplifying the operational and reputational damage.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable 'delpdf' action endpoint. Web application firewalls (WAFs) can be configured to block suspicious requests attempting path traversal patterns or unauthorized file deletion commands targeting this plugin. Network-level restrictions limiting access to the WordPress admin and plugin endpoints to trusted IP addresses can reduce exposure. Organizations should monitor web server logs for unusual deletion requests or errors related to file access. Until an official patch is released, disabling or uninstalling the TicketBAI Facturas para WooCommerce plugin is advisable if feasible. Additionally, implementing regular, verified backups of the WordPress site and server files will enable rapid recovery if file deletion occurs. Security teams should also ensure that file system permissions are appropriately restrictive, preventing the web server process from deleting critical files outside designated directories. Finally, organizations should subscribe to vendor and security advisories to apply patches promptly once available.
Affected Countries
Spain, Germany, France, Italy, Netherlands
CVE-2025-4564: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in facturaone TicketBAI Facturas para WooCommerce
Description
The TicketBAI Facturas para WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation via the 'delpdf' action in all versions up to, and including, 3.18. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI-Powered Analysis
Technical Analysis
CVE-2025-4564 is a critical security vulnerability identified in the TicketBAI Facturas para WooCommerce plugin for WordPress, affecting all versions up to and including 3.18. This vulnerability is classified as CWE-22, which relates to improper limitation of a pathname to a restricted directory, commonly known as a path traversal flaw. The issue arises from insufficient validation of file paths in the 'delpdf' action, allowing unauthenticated attackers to craft requests that can delete arbitrary files on the server hosting the WordPress site. Because no authentication or user interaction is required, the attack surface is broad and easily exploitable remotely over the network. The ability to delete arbitrary files can lead to severe consequences, including the deletion of critical WordPress configuration files such as wp-config.php. Such deletions can disrupt the availability of the website or, more dangerously, enable attackers to execute remote code by manipulating the environment or triggering fallback behaviors. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network vector, no privileges required, no user interaction). Although no known exploits are reported in the wild yet, the severity and simplicity of exploitation make this vulnerability a high priority for patching and mitigation. The lack of available patches at the time of disclosure further increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, especially those using WordPress with the TicketBAI Facturas para WooCommerce plugin, this vulnerability poses a significant risk. The arbitrary file deletion can lead to website defacement, downtime, data loss, and potential remote code execution, which could compromise the entire web server and connected internal networks. Given that WooCommerce is widely used for e-commerce across Europe, including small and medium enterprises that may rely on this plugin for invoicing and compliance with local tax regulations (such as TicketBAI in Spain), the impact could disrupt business operations and customer trust. Additionally, compromise of financial or personal data processed through these platforms could lead to violations of GDPR, resulting in legal and financial penalties. The vulnerability could also be leveraged as an entry point for broader attacks, including lateral movement within corporate networks or deployment of ransomware, amplifying the operational and reputational damage.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable 'delpdf' action endpoint. Web application firewalls (WAFs) can be configured to block suspicious requests attempting path traversal patterns or unauthorized file deletion commands targeting this plugin. Network-level restrictions limiting access to the WordPress admin and plugin endpoints to trusted IP addresses can reduce exposure. Organizations should monitor web server logs for unusual deletion requests or errors related to file access. Until an official patch is released, disabling or uninstalling the TicketBAI Facturas para WooCommerce plugin is advisable if feasible. Additionally, implementing regular, verified backups of the WordPress site and server files will enable rapid recovery if file deletion occurs. Security teams should also ensure that file system permissions are appropriately restrictive, preventing the web server process from deleting critical files outside designated directories. Finally, organizations should subscribe to vendor and security advisories to apply patches promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-12T05:42:19.386Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec75c
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 12:13:10 PM
Last updated: 10/7/2025, 1:46:36 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11396: SQL Injection in code-projects Simple Food Ordering System
MediumCVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.