CVE-2025-4603: CWE-73 External Control of File Name or Path in emagicone eMagicOne Store Manager for WooCommerce
The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_file() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This is only exploitable by unauthenticated attackers in default configurations where the the default password is left as 1:1, or where the attacker gains access to the credentials.
AI Analysis
Technical Summary
CVE-2025-4603 is a critical vulnerability identified in the eMagicOne Store Manager for WooCommerce plugin for WordPress, affecting all versions up to and including 1.2.5. The vulnerability stems from insufficient validation of file paths in the delete_file() function, which allows an attacker to perform arbitrary file deletion on the server hosting the plugin. Specifically, the flaw is categorized under CWE-73, which involves external control of file names or paths. Exploitation of this vulnerability can lead to deletion of critical files such as wp-config.php, a core configuration file for WordPress. Deleting such files can disrupt website availability and potentially enable remote code execution (RCE), allowing attackers to execute arbitrary code on the server. The vulnerability is exploitable by unauthenticated attackers only under certain conditions: either when the plugin is left with its default password set to '1:1' or if the attacker has obtained valid credentials. The CVSS v3.1 base score is 9.1, reflecting a critical severity due to the network attack vector, no required privileges or user interaction, and high impact on integrity and availability. Although no known exploits are currently reported in the wild, the ease of exploitation combined with the potential for severe impact makes this a significant threat. No patches have been linked yet, indicating that mitigation may require configuration changes or vendor updates once available.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity and availability of e-commerce platforms running WooCommerce with the affected plugin. Successful exploitation could lead to deletion of essential files, causing website downtime, loss of customer trust, and potential financial losses. Furthermore, if attackers achieve remote code execution, they could compromise sensitive customer data, including payment information, violating GDPR and other data protection regulations. The unauthenticated nature of the attack vector increases the risk, especially for organizations that have not changed default credentials or have weak access controls. Given the widespread use of WooCommerce in Europe for online retail, this vulnerability could disrupt business operations and expose organizations to regulatory penalties and reputational damage.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify the presence of the eMagicOne Store Manager plugin and verify the version in use. They must ensure that default passwords are changed from '1:1' to strong, unique credentials to prevent unauthorized access. Until an official patch is released, organizations should consider disabling or uninstalling the plugin if it is not essential. Implementing strict file system permissions to restrict the plugin's ability to delete critical files can reduce risk. Monitoring server logs for suspicious file deletion attempts and unauthorized access attempts is recommended. Additionally, organizations should maintain regular backups of website files and databases to enable rapid recovery in case of file deletion. Finally, applying a web application firewall (WAF) with rules to detect and block exploitation attempts targeting this vulnerability can provide an additional layer of defense.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-4603: CWE-73 External Control of File Name or Path in emagicone eMagicOne Store Manager for WooCommerce
Description
The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_file() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This is only exploitable by unauthenticated attackers in default configurations where the the default password is left as 1:1, or where the attacker gains access to the credentials.
AI-Powered Analysis
Technical Analysis
CVE-2025-4603 is a critical vulnerability identified in the eMagicOne Store Manager for WooCommerce plugin for WordPress, affecting all versions up to and including 1.2.5. The vulnerability stems from insufficient validation of file paths in the delete_file() function, which allows an attacker to perform arbitrary file deletion on the server hosting the plugin. Specifically, the flaw is categorized under CWE-73, which involves external control of file names or paths. Exploitation of this vulnerability can lead to deletion of critical files such as wp-config.php, a core configuration file for WordPress. Deleting such files can disrupt website availability and potentially enable remote code execution (RCE), allowing attackers to execute arbitrary code on the server. The vulnerability is exploitable by unauthenticated attackers only under certain conditions: either when the plugin is left with its default password set to '1:1' or if the attacker has obtained valid credentials. The CVSS v3.1 base score is 9.1, reflecting a critical severity due to the network attack vector, no required privileges or user interaction, and high impact on integrity and availability. Although no known exploits are currently reported in the wild, the ease of exploitation combined with the potential for severe impact makes this a significant threat. No patches have been linked yet, indicating that mitigation may require configuration changes or vendor updates once available.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity and availability of e-commerce platforms running WooCommerce with the affected plugin. Successful exploitation could lead to deletion of essential files, causing website downtime, loss of customer trust, and potential financial losses. Furthermore, if attackers achieve remote code execution, they could compromise sensitive customer data, including payment information, violating GDPR and other data protection regulations. The unauthenticated nature of the attack vector increases the risk, especially for organizations that have not changed default credentials or have weak access controls. Given the widespread use of WooCommerce in Europe for online retail, this vulnerability could disrupt business operations and expose organizations to regulatory penalties and reputational damage.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify the presence of the eMagicOne Store Manager plugin and verify the version in use. They must ensure that default passwords are changed from '1:1' to strong, unique credentials to prevent unauthorized access. Until an official patch is released, organizations should consider disabling or uninstalling the plugin if it is not essential. Implementing strict file system permissions to restrict the plugin's ability to delete critical files can reduce risk. Monitoring server logs for suspicious file deletion attempts and unauthorized access attempts is recommended. Additionally, organizations should maintain regular backups of website files and databases to enable rapid recovery in case of file deletion. Finally, applying a web application firewall (WAF) with rules to detect and block exploitation attempts targeting this vulnerability can provide an additional layer of defense.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-05-12T18:07:39.510Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683142850acd01a249277dc2
Added to database: 5/24/2025, 3:52:37 AM
Last enriched: 7/8/2025, 8:42:01 PM
Last updated: 7/31/2025, 3:38:03 PM
Views: 10
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.