Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6989: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme

0
High
VulnerabilityCVE-2025-6989cvecve-2025-6989cwe-22
Published: Sat Jul 26 2025 (07/26/2025, 07:23:51 UTC)
Source: CVE Database V5
Vendor/Project: hogash
Product: KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme

Description

The Kallyas theme for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the delete_font() function in all versions up to, and including, 4.21.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary folders on the server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:57:59 UTC

Technical Analysis

CVE-2025-6989 is a path traversal vulnerability classified under CWE-22 found in the KALLYAS - Creative eCommerce Multi-Purpose WordPress theme developed by hogash. The vulnerability arises from insufficient validation of file paths in the delete_font() function, which is responsible for deleting font-related folders. This flaw allows authenticated users with Contributor-level permissions or higher to manipulate the file path parameter to traverse outside the intended directory scope and delete arbitrary folders on the server filesystem. Since WordPress Contributor roles are commonly assigned to users who can upload and manage content but not administer the site, this expands the attack surface beyond administrators. The vulnerability affects all versions up to and including 4.21.0 of the theme. The CVSS v3.1 base score is 8.1, reflecting network exploitability (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), but high integrity (I:H) and availability (A:H) impacts. Exploiting this vulnerability can result in deletion of critical files or directories, potentially causing site outages or data loss. No patches or public exploits are currently available, but the vulnerability has been publicly disclosed and assigned a CVE identifier. Given the popularity of WordPress and the KALLYAS theme in eCommerce and creative websites, this vulnerability poses a significant risk to affected installations worldwide.

Potential Impact

The primary impact of CVE-2025-6989 is on the integrity and availability of affected WordPress sites using the KALLYAS theme. Attackers with Contributor-level access can delete arbitrary folders, potentially removing essential theme files, uploaded content, or other critical data. This can lead to site malfunction, defacement, or complete denial of service. Since the vulnerability does not affect confidentiality directly, sensitive data exposure is unlikely, but the loss of data or service disruption can severely affect business operations, especially for eCommerce sites relying on the theme. The ease of exploitation over the network and the relatively low privilege requirement increase the risk of exploitation. Organizations may face reputational damage, financial loss, and operational downtime if exploited. Recovery may require restoring from backups and thorough security audits to prevent further compromise.

Mitigation Recommendations

To mitigate CVE-2025-6989, organizations should immediately upgrade the KALLYAS theme to a patched version once available from the vendor. In the absence of an official patch, administrators should restrict Contributor-level permissions to trusted users only and audit existing user roles to minimize risk. Implementing web application firewalls (WAFs) with rules to detect and block path traversal attempts targeting the delete_font() function can provide temporary protection. Regular backups of website files and databases are critical to enable recovery from potential destructive attacks. Additionally, monitoring file system changes and access logs for suspicious deletion activity can help detect exploitation attempts early. Developers and site administrators should review custom code and plugins for similar path traversal vulnerabilities and apply strict input validation and sanitization on all file path parameters. Employing the principle of least privilege for all user roles and isolating critical directories with appropriate file system permissions will further reduce impact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-01T21:06:01.353Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6884849ead5a09ad005c4a0a

Added to database: 7/26/2025, 7:32:46 AM

Last enriched: 2/26/2026, 3:57:59 PM

Last updated: 3/23/2026, 7:35:10 AM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses