Skip to main content

CVE-2025-4603: CWE-73 External Control of File Name or Path in emagicone eMagicOne Store Manager for WooCommerce

Critical
VulnerabilityCVE-2025-4603cvecve-2025-4603cwe-73
Published: Sat May 24 2025 (05/24/2025, 03:37:32 UTC)
Source: CVE
Vendor/Project: emagicone
Product: eMagicOne Store Manager for WooCommerce

Description

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_file() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This is only exploitable by unauthenticated attackers in default configurations where the the default password is left as 1:1, or where the attacker gains access to the credentials.

AI-Powered Analysis

AILast updated: 07/08/2025, 20:42:01 UTC

Technical Analysis

CVE-2025-4603 is a critical vulnerability identified in the eMagicOne Store Manager for WooCommerce plugin for WordPress, affecting all versions up to and including 1.2.5. The vulnerability stems from insufficient validation of file paths in the delete_file() function, which allows an attacker to perform arbitrary file deletion on the server hosting the plugin. Specifically, the flaw is categorized under CWE-73, which involves external control of file names or paths. Exploitation of this vulnerability can lead to deletion of critical files such as wp-config.php, a core configuration file for WordPress. Deleting such files can disrupt website availability and potentially enable remote code execution (RCE), allowing attackers to execute arbitrary code on the server. The vulnerability is exploitable by unauthenticated attackers only under certain conditions: either when the plugin is left with its default password set to '1:1' or if the attacker has obtained valid credentials. The CVSS v3.1 base score is 9.1, reflecting a critical severity due to the network attack vector, no required privileges or user interaction, and high impact on integrity and availability. Although no known exploits are currently reported in the wild, the ease of exploitation combined with the potential for severe impact makes this a significant threat. No patches have been linked yet, indicating that mitigation may require configuration changes or vendor updates once available.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity and availability of e-commerce platforms running WooCommerce with the affected plugin. Successful exploitation could lead to deletion of essential files, causing website downtime, loss of customer trust, and potential financial losses. Furthermore, if attackers achieve remote code execution, they could compromise sensitive customer data, including payment information, violating GDPR and other data protection regulations. The unauthenticated nature of the attack vector increases the risk, especially for organizations that have not changed default credentials or have weak access controls. Given the widespread use of WooCommerce in Europe for online retail, this vulnerability could disrupt business operations and expose organizations to regulatory penalties and reputational damage.

Mitigation Recommendations

European organizations should immediately audit their WooCommerce installations to identify the presence of the eMagicOne Store Manager plugin and verify the version in use. They must ensure that default passwords are changed from '1:1' to strong, unique credentials to prevent unauthorized access. Until an official patch is released, organizations should consider disabling or uninstalling the plugin if it is not essential. Implementing strict file system permissions to restrict the plugin's ability to delete critical files can reduce risk. Monitoring server logs for suspicious file deletion attempts and unauthorized access attempts is recommended. Additionally, organizations should maintain regular backups of website files and databases to enable rapid recovery in case of file deletion. Finally, applying a web application firewall (WAF) with rules to detect and block exploitation attempts targeting this vulnerability can provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-12T18:07:39.510Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683142850acd01a249277dc2

Added to database: 5/24/2025, 3:52:37 AM

Last enriched: 7/8/2025, 8:42:01 PM

Last updated: 7/31/2025, 3:38:03 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats