Skip to main content

CVE-2025-4564: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in facturaone TicketBAI Facturas para WooCommerce

Critical
VulnerabilityCVE-2025-4564cvecve-2025-4564cwe-22
Published: Thu May 15 2025 (05/15/2025, 11:13:15 UTC)
Source: CVE
Vendor/Project: facturaone
Product: TicketBAI Facturas para WooCommerce

Description

The TicketBAI Facturas para WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation via the 'delpdf' action in all versions up to, and including, 3.18. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

AILast updated: 07/06/2025, 12:13:10 UTC

Technical Analysis

CVE-2025-4564 is a critical security vulnerability identified in the TicketBAI Facturas para WooCommerce plugin for WordPress, affecting all versions up to and including 3.18. This vulnerability is classified as CWE-22, which relates to improper limitation of a pathname to a restricted directory, commonly known as a path traversal flaw. The issue arises from insufficient validation of file paths in the 'delpdf' action, allowing unauthenticated attackers to craft requests that can delete arbitrary files on the server hosting the WordPress site. Because no authentication or user interaction is required, the attack surface is broad and easily exploitable remotely over the network. The ability to delete arbitrary files can lead to severe consequences, including the deletion of critical WordPress configuration files such as wp-config.php. Such deletions can disrupt the availability of the website or, more dangerously, enable attackers to execute remote code by manipulating the environment or triggering fallback behaviors. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation (network vector, no privileges required, no user interaction). Although no known exploits are reported in the wild yet, the severity and simplicity of exploitation make this vulnerability a high priority for patching and mitigation. The lack of available patches at the time of disclosure further increases the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations, especially those using WordPress with the TicketBAI Facturas para WooCommerce plugin, this vulnerability poses a significant risk. The arbitrary file deletion can lead to website defacement, downtime, data loss, and potential remote code execution, which could compromise the entire web server and connected internal networks. Given that WooCommerce is widely used for e-commerce across Europe, including small and medium enterprises that may rely on this plugin for invoicing and compliance with local tax regulations (such as TicketBAI in Spain), the impact could disrupt business operations and customer trust. Additionally, compromise of financial or personal data processed through these platforms could lead to violations of GDPR, resulting in legal and financial penalties. The vulnerability could also be leveraged as an entry point for broader attacks, including lateral movement within corporate networks or deployment of ransomware, amplifying the operational and reputational damage.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the vulnerable 'delpdf' action endpoint. Web application firewalls (WAFs) can be configured to block suspicious requests attempting path traversal patterns or unauthorized file deletion commands targeting this plugin. Network-level restrictions limiting access to the WordPress admin and plugin endpoints to trusted IP addresses can reduce exposure. Organizations should monitor web server logs for unusual deletion requests or errors related to file access. Until an official patch is released, disabling or uninstalling the TicketBAI Facturas para WooCommerce plugin is advisable if feasible. Additionally, implementing regular, verified backups of the WordPress site and server files will enable rapid recovery if file deletion occurs. Security teams should also ensure that file system permissions are appropriately restrictive, preventing the web server process from deleting critical files outside designated directories. Finally, organizations should subscribe to vendor and security advisories to apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-12T05:42:19.386Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec75c

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 12:13:10 PM

Last updated: 8/15/2025, 9:06:27 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats