CVE-2025-66680: n/a
An issue in the WiseDelfile64.sys component of WiseCleaner Wise Force Deleter 7.3.2 and earlier allows attackers to delete arbitrary files via a crafted request.
AI Analysis
Technical Summary
CVE-2025-66680 is a vulnerability identified in the WiseDelfile64.sys driver, a component of WiseCleaner Wise Force Deleter version 7.3.2 and earlier. This vulnerability allows an attacker with limited privileges (PR:L) to delete arbitrary files on the affected Windows system by sending a specially crafted request to the driver. The flaw is categorized under CWE-59, which relates to improper neutralization of file path elements, enabling unauthorized file deletion. The attack vector is local (AV:L), meaning the attacker must have some level of access to the system but does not require user interaction (UI:N) to exploit the vulnerability. The vulnerability impacts the integrity and availability of the system by allowing deletion of critical files, potentially leading to system instability or denial of service. The CVSS 3.1 base score is 7.1, indicating a high severity level due to the combination of low attack complexity, required privileges, and significant impact. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is particularly concerning for environments where Wise Force Deleter is used for file management or deletion tasks, as attackers could leverage this flaw to disrupt operations or remove critical files maliciously.
Potential Impact
The primary impact of CVE-2025-66680 is the unauthorized deletion of arbitrary files on affected systems, which compromises system integrity and availability. Organizations relying on Wise Force Deleter for file management may face operational disruptions, data loss, or denial of service conditions if critical system or application files are deleted. This could affect business continuity, especially in environments where file deletion tools are integrated into automated workflows or administrative tasks. The vulnerability requires local access with limited privileges, which somewhat limits remote exploitation but still poses a significant risk from insider threats or attackers who have gained initial foothold. The absence of a patch increases exposure time, potentially allowing attackers to develop exploits. The impact is heightened in environments with sensitive or critical data, where file deletion could lead to compliance violations, data integrity issues, or costly recovery efforts.
Mitigation Recommendations
To mitigate CVE-2025-66680, organizations should immediately restrict access to systems running Wise Force Deleter, limiting user privileges to the minimum necessary. Avoid running the vulnerable version (7.3.2 and earlier) on critical systems until a patch is available. Monitor file system activity and logs for unusual deletion patterns or unauthorized access attempts targeting the WiseDelfile64.sys driver. Employ application whitelisting and endpoint protection solutions to detect and block suspicious behavior related to file deletion. If possible, disable or uninstall Wise Force Deleter on systems where it is not essential. Establish strict local user account controls and audit local privilege escalations to reduce the risk of exploitation. Stay informed on vendor advisories and apply patches promptly once released. Additionally, implement regular backups and verify their integrity to enable recovery from malicious file deletions.
Affected Countries
United States, China, Germany, United Kingdom, Japan, South Korea, India, Canada, Australia, France
CVE-2025-66680: n/a
Description
An issue in the WiseDelfile64.sys component of WiseCleaner Wise Force Deleter 7.3.2 and earlier allows attackers to delete arbitrary files via a crafted request.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-66680 is a vulnerability identified in the WiseDelfile64.sys driver, a component of WiseCleaner Wise Force Deleter version 7.3.2 and earlier. This vulnerability allows an attacker with limited privileges (PR:L) to delete arbitrary files on the affected Windows system by sending a specially crafted request to the driver. The flaw is categorized under CWE-59, which relates to improper neutralization of file path elements, enabling unauthorized file deletion. The attack vector is local (AV:L), meaning the attacker must have some level of access to the system but does not require user interaction (UI:N) to exploit the vulnerability. The vulnerability impacts the integrity and availability of the system by allowing deletion of critical files, potentially leading to system instability or denial of service. The CVSS 3.1 base score is 7.1, indicating a high severity level due to the combination of low attack complexity, required privileges, and significant impact. No patches or fixes have been released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is particularly concerning for environments where Wise Force Deleter is used for file management or deletion tasks, as attackers could leverage this flaw to disrupt operations or remove critical files maliciously.
Potential Impact
The primary impact of CVE-2025-66680 is the unauthorized deletion of arbitrary files on affected systems, which compromises system integrity and availability. Organizations relying on Wise Force Deleter for file management may face operational disruptions, data loss, or denial of service conditions if critical system or application files are deleted. This could affect business continuity, especially in environments where file deletion tools are integrated into automated workflows or administrative tasks. The vulnerability requires local access with limited privileges, which somewhat limits remote exploitation but still poses a significant risk from insider threats or attackers who have gained initial foothold. The absence of a patch increases exposure time, potentially allowing attackers to develop exploits. The impact is heightened in environments with sensitive or critical data, where file deletion could lead to compliance violations, data integrity issues, or costly recovery efforts.
Mitigation Recommendations
To mitigate CVE-2025-66680, organizations should immediately restrict access to systems running Wise Force Deleter, limiting user privileges to the minimum necessary. Avoid running the vulnerable version (7.3.2 and earlier) on critical systems until a patch is available. Monitor file system activity and logs for unusual deletion patterns or unauthorized access attempts targeting the WiseDelfile64.sys driver. Employ application whitelisting and endpoint protection solutions to detect and block suspicious behavior related to file deletion. If possible, disable or uninstall Wise Force Deleter on systems where it is not essential. Establish strict local user account controls and audit local privilege escalations to reduce the risk of exploitation. Stay informed on vendor advisories and apply patches promptly once released. Additionally, implement regular backups and verify their integrity to enable recovery from malicious file deletions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69a702c6d1a09e29cb555065
Added to database: 3/3/2026, 3:48:22 PM
Last enriched: 3/10/2026, 5:19:45 PM
Last updated: 4/18/2026, 2:44:56 PM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.