CVE-2025-4564: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in facturaone TicketBAI Facturas para WooCommerce
The TicketBAI Facturas para WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation via the 'delpdf' action in all versions up to, and including, 3.18. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI Analysis
Technical Summary
CVE-2025-4564 is a critical security vulnerability identified in the TicketBAI Facturas para WooCommerce plugin for WordPress, affecting all versions up to and including 3.18. This vulnerability is classified as CWE-22, which relates to improper limitation of a pathname to a restricted directory, commonly known as a path traversal flaw. The issue arises from insufficient validation of file paths in the 'delpdf' action, allowing unauthenticated attackers to craft requests that can delete arbitrary files on the server hosting the WordPress site. Because no authentication or user interaction is required, the attack surface is broad and easily exploitable remotely over the network. The ability to delete arbitrary files can lead to severe consequences, including the deletion of critical WordPress configuration files such as wp-config.php. Such deletions can disrupt the availability of the website or, more dangerously, enable attackers to execute remote code by manipulating the environment or triggering fallback behaviors. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network vector, no privileges required, no user interaction). Although no known exploits are reported in the wild yet, the severity and simplicity of exploitation make this vulnerability a high priority for patching and mitigation. The lack of available patches at the time of disclosure further increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, especially those using WordPress with the TicketBAI Facturas para WooCommerce plugin, this vulnerability poses a significant risk. The arbitrary file deletion can lead to website defacement, downtime, data loss, and potential remote code execution, which could compromise the entire web server and connected internal networks. Given that WooCommerce is widely used for e-commerce across Europe, including small and medium enterprises that may rely on this plugin for invoicing and compliance with local tax regulations (such as TicketBAI in Spain), the impact could disrupt business operations and customer trust. Additionally, compromise of financial or personal data processed through these platforms could lead to violations of GDPR, resulting in legal and financial penalties. The vulnerability could also be leveraged as an entry point for broader attacks, including lateral movement within corporate networks or deployment of ransomware, amplifying the operational and reputational damage.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable 'delpdf' action endpoint. Web application firewalls (WAFs) can be configured to block suspicious requests attempting path traversal patterns or unauthorized file deletion commands targeting this plugin. Network-level restrictions limiting access to the WordPress admin and plugin endpoints to trusted IP addresses can reduce exposure. Organizations should monitor web server logs for unusual deletion requests or errors related to file access. Until an official patch is released, disabling or uninstalling the TicketBAI Facturas para WooCommerce plugin is advisable if feasible. Additionally, implementing regular, verified backups of the WordPress site and server files will enable rapid recovery if file deletion occurs. Security teams should also ensure that file system permissions are appropriately restrictive, preventing the web server process from deleting critical files outside designated directories. Finally, organizations should subscribe to vendor and security advisories to apply patches promptly once available.
Affected Countries
Spain, Germany, France, Italy, Netherlands
CVE-2025-4564: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in facturaone TicketBAI Facturas para WooCommerce
Description
The TicketBAI Facturas para WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation via the 'delpdf' action in all versions up to, and including, 3.18. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI-Powered Analysis
Technical Analysis
CVE-2025-4564 is a critical security vulnerability identified in the TicketBAI Facturas para WooCommerce plugin for WordPress, affecting all versions up to and including 3.18. This vulnerability is classified as CWE-22, which relates to improper limitation of a pathname to a restricted directory, commonly known as a path traversal flaw. The issue arises from insufficient validation of file paths in the 'delpdf' action, allowing unauthenticated attackers to craft requests that can delete arbitrary files on the server hosting the WordPress site. Because no authentication or user interaction is required, the attack surface is broad and easily exploitable remotely over the network. The ability to delete arbitrary files can lead to severe consequences, including the deletion of critical WordPress configuration files such as wp-config.php. Such deletions can disrupt the availability of the website or, more dangerously, enable attackers to execute remote code by manipulating the environment or triggering fallback behaviors. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network vector, no privileges required, no user interaction). Although no known exploits are reported in the wild yet, the severity and simplicity of exploitation make this vulnerability a high priority for patching and mitigation. The lack of available patches at the time of disclosure further increases the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, especially those using WordPress with the TicketBAI Facturas para WooCommerce plugin, this vulnerability poses a significant risk. The arbitrary file deletion can lead to website defacement, downtime, data loss, and potential remote code execution, which could compromise the entire web server and connected internal networks. Given that WooCommerce is widely used for e-commerce across Europe, including small and medium enterprises that may rely on this plugin for invoicing and compliance with local tax regulations (such as TicketBAI in Spain), the impact could disrupt business operations and customer trust. Additionally, compromise of financial or personal data processed through these platforms could lead to violations of GDPR, resulting in legal and financial penalties. The vulnerability could also be leveraged as an entry point for broader attacks, including lateral movement within corporate networks or deployment of ransomware, amplifying the operational and reputational damage.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable 'delpdf' action endpoint. Web application firewalls (WAFs) can be configured to block suspicious requests attempting path traversal patterns or unauthorized file deletion commands targeting this plugin. Network-level restrictions limiting access to the WordPress admin and plugin endpoints to trusted IP addresses can reduce exposure. Organizations should monitor web server logs for unusual deletion requests or errors related to file access. Until an official patch is released, disabling or uninstalling the TicketBAI Facturas para WooCommerce plugin is advisable if feasible. Additionally, implementing regular, verified backups of the WordPress site and server files will enable rapid recovery if file deletion occurs. Security teams should also ensure that file system permissions are appropriately restrictive, preventing the web server process from deleting critical files outside designated directories. Finally, organizations should subscribe to vendor and security advisories to apply patches promptly once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-12T05:42:19.386Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aec75c
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 12:13:10 PM
Last updated: 8/15/2025, 9:06:27 PM
Views: 16
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.