CVE-2025-6065: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wework4web Image Resizer On The Fly

Critical
VulnerabilityCVE-2025-6065cvecve-2025-6065cwe-22
Published: Sat Jun 14 2025 (06/14/2025, 08:23:21 UTC)
Source: CVE Database V5
Vendor/Project: wework4web
Product: Image Resizer On The Fly

Description

The Image Resizer On The Fly plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete' task in all versions up to, and including, 1.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

AILast updated: 06/14/2025, 08:49:26 UTC

Technical Analysis

CVE-2025-6065 is a critical security vulnerability identified in the WordPress plugin 'Image Resizer On The Fly' developed by wework4web. This plugin, used for dynamically resizing images, suffers from a path traversal flaw (CWE-22) in its 'delete' task functionality. The vulnerability arises due to improper validation of file paths, allowing an unauthenticated attacker to specify arbitrary file paths outside the intended directory. Consequently, attackers can delete arbitrary files on the web server hosting the WordPress site. Since the plugin does not require authentication or user interaction to exploit this flaw, it is trivially exploitable remotely over the network. The impact is severe because deleting critical files such as 'wp-config.php' can lead to remote code execution, complete site compromise, or denial of service. The CVSS v3.1 base score is 9.1, reflecting the high impact on integrity and availability, with no confidentiality loss directly but potential indirect consequences. The vulnerability affects all versions of the plugin up to and including 1.1, and as of the published date (June 14, 2025), no official patches have been released. Although no known exploits are currently observed in the wild, the low complexity and lack of required privileges make it a prime target for attackers. This vulnerability represents a critical risk for WordPress sites using this plugin, especially those exposed to the internet without additional protective controls.

Potential Impact

For European organizations, this vulnerability poses a significant threat to the integrity and availability of WordPress-based web assets. Many European businesses, government agencies, and NGOs rely on WordPress for their web presence, often using plugins like Image Resizer On The Fly for media management. Exploitation could lead to arbitrary file deletion, resulting in website outages, data loss, or full site compromise through remote code execution. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance, especially under GDPR if personal data is exposed or lost. The ease of exploitation without authentication increases the risk of automated mass scanning and attacks targeting vulnerable sites. Organizations in sectors with high web presence such as e-commerce, media, and public services are particularly vulnerable. Additionally, the potential for remote code execution could be leveraged to pivot into internal networks, escalating the impact beyond the web server. Given the criticality and the widespread use of WordPress in Europe, the threat could affect a large number of organizations, leading to significant operational and financial consequences.

Mitigation Recommendations

1. Immediate removal or disabling of the 'Image Resizer On The Fly' plugin until a secure patched version is released. 2. Implement Web Application Firewall (WAF) rules to detect and block requests containing suspicious path traversal patterns targeting the 'delete' task parameter. 3. Restrict file system permissions for the web server user to limit the scope of deletable files, ensuring critical configuration files like wp-config.php are not writable or deletable by the web process. 4. Monitor web server logs for unusual DELETE requests or access patterns indicative of exploitation attempts. 5. Employ network-level protections such as IP reputation filtering and rate limiting to reduce exposure to automated attacks. 6. Conduct a thorough audit of all WordPress plugins and remove or replace those that are unmaintained or have known vulnerabilities. 7. Prepare an incident response plan specifically for web server compromises involving file deletion or code execution. 8. Once available, promptly apply official patches from the plugin vendor and verify the fix through testing. 9. Educate web administrators on the risks of installing plugins from unverified sources and the importance of timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-13T13:36:30.138Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684d3417a8c9212743818b22

Added to database: 6/14/2025, 8:34:31 AM

Last enriched: 6/14/2025, 8:49:26 AM

Last updated: 6/14/2025, 4:46:31 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats