CVE-2025-6065: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wework4web Image Resizer On The Fly
The Image Resizer On The Fly plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete' task in all versions up to, and including, 1.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI Analysis
Technical Summary
CVE-2025-6065 is a critical security vulnerability identified in the WordPress plugin 'Image Resizer On The Fly' developed by wework4web. This plugin, used for dynamically resizing images, suffers from a path traversal flaw (CWE-22) in its 'delete' task functionality. The vulnerability arises due to improper validation of file paths, allowing an unauthenticated attacker to specify arbitrary file paths outside the intended directory. Consequently, attackers can delete arbitrary files on the web server hosting the WordPress site. Since the plugin does not require authentication or user interaction to exploit this flaw, it is trivially exploitable remotely over the network. The impact is severe because deleting critical files such as 'wp-config.php' can lead to remote code execution, complete site compromise, or denial of service. The CVSS v3.1 base score is 9.1, reflecting the high impact on integrity and availability, with no confidentiality loss directly but potential indirect consequences. The vulnerability affects all versions of the plugin up to and including 1.1, and as of the published date (June 14, 2025), no official patches have been released. Although no known exploits are currently observed in the wild, the low complexity and lack of required privileges make it a prime target for attackers. This vulnerability represents a critical risk for WordPress sites using this plugin, especially those exposed to the internet without additional protective controls.
Potential Impact
For European organizations, this vulnerability poses a significant threat to the integrity and availability of WordPress-based web assets. Many European businesses, government agencies, and NGOs rely on WordPress for their web presence, often using plugins like Image Resizer On The Fly for media management. Exploitation could lead to arbitrary file deletion, resulting in website outages, data loss, or full site compromise through remote code execution. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR if personal data is exposed or lost. The ease of exploitation without authentication increases the risk of automated mass scanning and attacks targeting vulnerable sites. Organizations in sectors with high web presence such as e-commerce, media, and public services are particularly vulnerable. Additionally, the potential for remote code execution could be leveraged to pivot into internal networks, escalating the impact beyond the web server. Given the criticality and the widespread use of WordPress in Europe, the threat could affect a large number of organizations, leading to significant operational and financial consequences.
Mitigation Recommendations
1. Immediate removal or disabling of the 'Image Resizer On The Fly' plugin until a secure patched version is released. 2. Implement Web Application Firewall (WAF) rules to detect and block requests containing suspicious path traversal patterns targeting the 'delete' task parameter. 3. Restrict file system permissions for the web server user to limit the scope of deletable files, ensuring critical configuration files like wp-config.php are not writable or deletable by the web process. 4. Monitor web server logs for unusual DELETE requests or access patterns indicative of exploitation attempts. 5. Employ network-level protections such as IP reputation filtering and rate limiting to reduce exposure to automated attacks. 6. Conduct a thorough audit of all WordPress plugins and remove or replace those that are unmaintained or have known vulnerabilities. 7. Prepare an incident response plan specifically for web server compromises involving file deletion or code execution. 8. Once available, promptly apply official patches from the plugin vendor and verify the fix through testing. 9. Educate web administrators on the risks of installing plugins from unverified sources and the importance of timely updates.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-6065: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wework4web Image Resizer On The Fly
Description
The Image Resizer On The Fly plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete' task in all versions up to, and including, 1.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI-Powered Analysis
Technical Analysis
CVE-2025-6065 is a critical security vulnerability identified in the WordPress plugin 'Image Resizer On The Fly' developed by wework4web. This plugin, used for dynamically resizing images, suffers from a path traversal flaw (CWE-22) in its 'delete' task functionality. The vulnerability arises due to improper validation of file paths, allowing an unauthenticated attacker to specify arbitrary file paths outside the intended directory. Consequently, attackers can delete arbitrary files on the web server hosting the WordPress site. Since the plugin does not require authentication or user interaction to exploit this flaw, it is trivially exploitable remotely over the network. The impact is severe because deleting critical files such as 'wp-config.php' can lead to remote code execution, complete site compromise, or denial of service. The CVSS v3.1 base score is 9.1, reflecting the high impact on integrity and availability, with no confidentiality loss directly but potential indirect consequences. The vulnerability affects all versions of the plugin up to and including 1.1, and as of the published date (June 14, 2025), no official patches have been released. Although no known exploits are currently observed in the wild, the low complexity and lack of required privileges make it a prime target for attackers. This vulnerability represents a critical risk for WordPress sites using this plugin, especially those exposed to the internet without additional protective controls.
Potential Impact
For European organizations, this vulnerability poses a significant threat to the integrity and availability of WordPress-based web assets. Many European businesses, government agencies, and NGOs rely on WordPress for their web presence, often using plugins like Image Resizer On The Fly for media management. Exploitation could lead to arbitrary file deletion, resulting in website outages, data loss, or full site compromise through remote code execution. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR if personal data is exposed or lost. The ease of exploitation without authentication increases the risk of automated mass scanning and attacks targeting vulnerable sites. Organizations in sectors with high web presence such as e-commerce, media, and public services are particularly vulnerable. Additionally, the potential for remote code execution could be leveraged to pivot into internal networks, escalating the impact beyond the web server. Given the criticality and the widespread use of WordPress in Europe, the threat could affect a large number of organizations, leading to significant operational and financial consequences.
Mitigation Recommendations
1. Immediate removal or disabling of the 'Image Resizer On The Fly' plugin until a secure patched version is released. 2. Implement Web Application Firewall (WAF) rules to detect and block requests containing suspicious path traversal patterns targeting the 'delete' task parameter. 3. Restrict file system permissions for the web server user to limit the scope of deletable files, ensuring critical configuration files like wp-config.php are not writable or deletable by the web process. 4. Monitor web server logs for unusual DELETE requests or access patterns indicative of exploitation attempts. 5. Employ network-level protections such as IP reputation filtering and rate limiting to reduce exposure to automated attacks. 6. Conduct a thorough audit of all WordPress plugins and remove or replace those that are unmaintained or have known vulnerabilities. 7. Prepare an incident response plan specifically for web server compromises involving file deletion or code execution. 8. Once available, promptly apply official patches from the plugin vendor and verify the fix through testing. 9. Educate web administrators on the risks of installing plugins from unverified sources and the importance of timely updates.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-13T13:36:30.138Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 684d3417a8c9212743818b22
Added to database: 6/14/2025, 8:34:31 AM
Last enriched: 6/14/2025, 8:49:26 AM
Last updated: 6/14/2025, 4:46:31 PM
Views: 5
Related Threats
CVE-2025-5337: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in metaslider Slider, Gallery, and Carousel by MetaSlider – Image Slider, Video Slider
MediumCVE-2025-5238: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yithemes YITH WooCommerce Wishlist
MediumCVE-2025-4667: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in croixhaug Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin
MediumCVE-2025-6070: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in josxha Restrict File Access
MediumCVE-2025-6064: CWE-352 Cross-Site Request Forgery (CSRF) in djerba WP URL Shortener
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.