Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7359: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in danielriera Counter live visitors for WooCommerce

0
High
VulnerabilityCVE-2025-7359cvecve-2025-7359cwe-22
Published: Wed Jul 16 2025 (07/16/2025, 06:40:41 UTC)
Source: CVE Database V5
Vendor/Project: danielriera
Product: Counter live visitors for WooCommerce

Description

The Counter live visitors for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wcvisitor_get_block function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to delete arbitrary files on the server. NOTE: This particular vulnerability deletes all the files in a targeted arbitrary directory rather than a specified arbitrary file, which can lead to loss of data or a denial of service condition.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:06:37 UTC

Technical Analysis

CVE-2025-7359 is a path traversal vulnerability classified under CWE-22 found in the Counter live visitors for WooCommerce plugin for WordPress, affecting all versions up to and including 1.3.6. The vulnerability arises from improper limitation of file pathnames in the wcvisitor_get_block function, which fails to adequately validate or sanitize user-supplied input that controls file paths. This flaw enables unauthenticated remote attackers to specify arbitrary directory paths on the server, causing the plugin to delete all files within the targeted directory rather than a single file. Unlike typical arbitrary file deletion vulnerabilities, this one deletes entire directories, amplifying the potential damage. The attack vector is network-based, requiring no privileges or user interaction, making it highly accessible to attackers. The vulnerability impacts the integrity and availability of the affected systems by enabling deletion of critical files, potentially leading to data loss, service disruption, or complete denial of service. The CVSS v3.1 base score is 8.2 (high), reflecting the ease of exploitation and significant impact. No patches or fixes are currently linked, and no known exploits have been observed in the wild as of the publication date. The plugin is widely used in WooCommerce-based WordPress e-commerce sites, which increases the potential attack surface.

Potential Impact

The vulnerability allows attackers to delete arbitrary directories and all contained files on the server hosting the vulnerable WooCommerce plugin. This can result in severe data loss, including deletion of critical website files, customer data, or backend configurations. The deletion of essential files can cause website downtime, loss of e-commerce functionality, and potential loss of revenue. Additionally, the denial of service caused by missing files can degrade user trust and damage brand reputation. Since the attack requires no authentication and can be performed remotely, any site using the affected plugin is at risk. Organizations with high-traffic WooCommerce stores or those handling sensitive customer information are particularly vulnerable. Recovery from such an attack may require restoring from backups, which could lead to operational delays and increased costs. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept or weaponized exploits could emerge rapidly.

Mitigation Recommendations

1. Immediate mitigation involves disabling or uninstalling the Counter live visitors for WooCommerce plugin until a patch is available. 2. Monitor official vendor channels and WordPress plugin repositories for updates or security patches addressing CVE-2025-7359 and apply them promptly. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests attempting path traversal patterns targeting the wcvisitor_get_block function. 4. Restrict file system permissions for the web server user to limit the directories and files that can be deleted by the plugin or web processes, minimizing potential damage. 5. Regularly back up website files and databases, ensuring backups are stored securely and offline to enable recovery in case of data deletion. 6. Conduct security audits and code reviews of installed plugins to identify similar path traversal or file manipulation vulnerabilities. 7. Employ intrusion detection systems (IDS) to alert on unusual file deletion or directory modification activities. 8. Educate site administrators on the risks of installing unverified plugins and maintaining up-to-date software.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-08T15:20:05.421Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68774ab7a83201eaacd43812

Added to database: 7/16/2025, 6:46:15 AM

Last enriched: 2/26/2026, 4:06:37 PM

Last updated: 3/24/2026, 8:37:12 PM

Views: 167

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses