CVE-2025-7359: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in danielriera Counter live visitors for WooCommerce
The Counter live visitors for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wcvisitor_get_block function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to delete arbitrary files on the server. NOTE: This particular vulnerability deletes all the files in a targeted arbitrary directory rather than a specified arbitrary file, which can lead to loss of data or a denial of service condition.
AI Analysis
Technical Summary
CVE-2025-7359 is a path traversal vulnerability classified under CWE-22 found in the Counter live visitors for WooCommerce plugin for WordPress, affecting all versions up to and including 1.3.6. The vulnerability arises from improper limitation of file pathnames in the wcvisitor_get_block function, which fails to adequately validate or sanitize user-supplied input that controls file paths. This flaw enables unauthenticated remote attackers to specify arbitrary directory paths on the server, causing the plugin to delete all files within the targeted directory rather than a single file. Unlike typical arbitrary file deletion vulnerabilities, this one deletes entire directories, amplifying the potential damage. The attack vector is network-based, requiring no privileges or user interaction, making it highly accessible to attackers. The vulnerability impacts the integrity and availability of the affected systems by enabling deletion of critical files, potentially leading to data loss, service disruption, or complete denial of service. The CVSS v3.1 base score is 8.2 (high), reflecting the ease of exploitation and significant impact. No patches or fixes are currently linked, and no known exploits have been observed in the wild as of the publication date. The plugin is widely used in WooCommerce-based WordPress e-commerce sites, which increases the potential attack surface.
Potential Impact
The vulnerability allows attackers to delete arbitrary directories and all contained files on the server hosting the vulnerable WooCommerce plugin. This can result in severe data loss, including deletion of critical website files, customer data, or backend configurations. The deletion of essential files can cause website downtime, loss of e-commerce functionality, and potential loss of revenue. Additionally, the denial of service caused by missing files can degrade user trust and damage brand reputation. Since the attack requires no authentication and can be performed remotely, any site using the affected plugin is at risk. Organizations with high-traffic WooCommerce stores or those handling sensitive customer information are particularly vulnerable. Recovery from such an attack may require restoring from backups, which could lead to operational delays and increased costs. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept or weaponized exploits could emerge rapidly.
Mitigation Recommendations
1. Immediate mitigation involves disabling or uninstalling the Counter live visitors for WooCommerce plugin until a patch is available. 2. Monitor official vendor channels and WordPress plugin repositories for updates or security patches addressing CVE-2025-7359 and apply them promptly. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests attempting path traversal patterns targeting the wcvisitor_get_block function. 4. Restrict file system permissions for the web server user to limit the directories and files that can be deleted by the plugin or web processes, minimizing potential damage. 5. Regularly back up website files and databases, ensuring backups are stored securely and offline to enable recovery in case of data deletion. 6. Conduct security audits and code reviews of installed plugins to identify similar path traversal or file manipulation vulnerabilities. 7. Employ intrusion detection systems (IDS) to alert on unusual file deletion or directory modification activities. 8. Educate site administrators on the risks of installing unverified plugins and maintaining up-to-date software.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-7359: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in danielriera Counter live visitors for WooCommerce
Description
The Counter live visitors for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wcvisitor_get_block function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to delete arbitrary files on the server. NOTE: This particular vulnerability deletes all the files in a targeted arbitrary directory rather than a specified arbitrary file, which can lead to loss of data or a denial of service condition.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-7359 is a path traversal vulnerability classified under CWE-22 found in the Counter live visitors for WooCommerce plugin for WordPress, affecting all versions up to and including 1.3.6. The vulnerability arises from improper limitation of file pathnames in the wcvisitor_get_block function, which fails to adequately validate or sanitize user-supplied input that controls file paths. This flaw enables unauthenticated remote attackers to specify arbitrary directory paths on the server, causing the plugin to delete all files within the targeted directory rather than a single file. Unlike typical arbitrary file deletion vulnerabilities, this one deletes entire directories, amplifying the potential damage. The attack vector is network-based, requiring no privileges or user interaction, making it highly accessible to attackers. The vulnerability impacts the integrity and availability of the affected systems by enabling deletion of critical files, potentially leading to data loss, service disruption, or complete denial of service. The CVSS v3.1 base score is 8.2 (high), reflecting the ease of exploitation and significant impact. No patches or fixes are currently linked, and no known exploits have been observed in the wild as of the publication date. The plugin is widely used in WooCommerce-based WordPress e-commerce sites, which increases the potential attack surface.
Potential Impact
The vulnerability allows attackers to delete arbitrary directories and all contained files on the server hosting the vulnerable WooCommerce plugin. This can result in severe data loss, including deletion of critical website files, customer data, or backend configurations. The deletion of essential files can cause website downtime, loss of e-commerce functionality, and potential loss of revenue. Additionally, the denial of service caused by missing files can degrade user trust and damage brand reputation. Since the attack requires no authentication and can be performed remotely, any site using the affected plugin is at risk. Organizations with high-traffic WooCommerce stores or those handling sensitive customer information are particularly vulnerable. Recovery from such an attack may require restoring from backups, which could lead to operational delays and increased costs. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as proof-of-concept or weaponized exploits could emerge rapidly.
Mitigation Recommendations
1. Immediate mitigation involves disabling or uninstalling the Counter live visitors for WooCommerce plugin until a patch is available. 2. Monitor official vendor channels and WordPress plugin repositories for updates or security patches addressing CVE-2025-7359 and apply them promptly. 3. Implement web application firewall (WAF) rules to detect and block suspicious requests attempting path traversal patterns targeting the wcvisitor_get_block function. 4. Restrict file system permissions for the web server user to limit the directories and files that can be deleted by the plugin or web processes, minimizing potential damage. 5. Regularly back up website files and databases, ensuring backups are stored securely and offline to enable recovery in case of data deletion. 6. Conduct security audits and code reviews of installed plugins to identify similar path traversal or file manipulation vulnerabilities. 7. Employ intrusion detection systems (IDS) to alert on unusual file deletion or directory modification activities. 8. Educate site administrators on the risks of installing unverified plugins and maintaining up-to-date software.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-08T15:20:05.421Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68774ab7a83201eaacd43812
Added to database: 7/16/2025, 6:46:15 AM
Last enriched: 2/26/2026, 4:06:37 PM
Last updated: 3/24/2026, 8:37:12 PM
Views: 167
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.