Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7526: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wptravelengine WP Travel Engine – Tour Booking Plugin – Tour Operator Software

0
Critical
VulnerabilityCVE-2025-7526cvecve-2025-7526cwe-22
Published: Thu Oct 09 2025 (10/09/2025, 05:23:52 UTC)
Source: CVE Database V5
Vendor/Project: wptravelengine
Product: WP Travel Engine – Tour Booking Plugin – Tour Operator Software

Description

CVE-2025-7526 is a critical path traversal vulnerability in the WP Travel Engine WordPress plugin, allowing unauthenticated attackers to delete arbitrary files on the server. The flaw exists in the set_user_profile_image function due to insufficient validation of file paths. Exploitation can lead to deletion of critical files like wp-config. php, potentially enabling remote code execution. The vulnerability affects all versions up to and including 6. 6. 7. No authentication or user interaction is required, and the attack can be performed remotely over the network. The CVSS score is 9. 8, reflecting its critical severity and ease of exploitation.

AI-Powered Analysis

AILast updated: 10/16/2025, 08:53:16 UTC

Technical Analysis

CVE-2025-7526 is a critical security vulnerability classified as CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, or Path Traversal) found in the WP Travel Engine – Tour Booking Plugin for WordPress. This plugin, widely used by tour operators to manage bookings, suffers from insufficient validation of file paths in the set_user_profile_image function. Specifically, the vulnerability allows an unauthenticated attacker to manipulate file paths to delete arbitrary files on the server by exploiting the path traversal flaw. Because the plugin does not properly restrict or sanitize the input paths, attackers can traverse directories and target sensitive files such as wp-config.php, which contains database credentials and other critical configuration data. Deleting or tampering with such files can lead to remote code execution, allowing attackers to gain full control over the affected WordPress instance and potentially the underlying server. The vulnerability affects all versions up to and including 6.6.7, with no known patches available at the time of disclosure. The CVSS v3.1 base score is 9.8, indicating a critical severity level due to the vulnerability's network accessibility (AV:N), lack of required privileges (PR:N), no user interaction needed (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits have been observed in the wild yet, the ease of exploitation and potential impact make this a high-risk threat. Organizations using this plugin should consider immediate mitigation steps to prevent exploitation.

Potential Impact

For European organizations, the impact of CVE-2025-7526 can be severe. Many tourism-related businesses in Europe rely on WordPress plugins like WP Travel Engine for managing bookings and customer interactions. Exploitation of this vulnerability could lead to unauthorized deletion of critical files, resulting in website downtime, loss of customer data, and exposure of sensitive configuration information. This can disrupt business operations, damage reputation, and lead to financial losses. Furthermore, successful remote code execution could allow attackers to deploy malware, conduct further lateral movement within the network, or exfiltrate data. Given the criticality and ease of exploitation, organizations face a high risk of compromise, especially those with publicly accessible WordPress sites that have not applied mitigations. The tourism sector, which is vital to many European economies, could be particularly affected, impacting both service providers and their customers.

Mitigation Recommendations

1. Immediate upgrade: Monitor for official patches or updates from the WP Travel Engine plugin developers and apply them as soon as they become available. 2. Temporary workaround: Restrict access to the vulnerable function by implementing web application firewall (WAF) rules that block suspicious requests attempting path traversal patterns targeting the set_user_profile_image function. 3. File system permissions: Harden file system permissions to prevent the web server user from deleting or modifying critical files such as wp-config.php. 4. Input validation: If custom code is used, implement strict validation and sanitization of all file path inputs to prevent traversal sequences (e.g., ../). 5. Monitoring and logging: Enable detailed logging of file operations and monitor for unusual deletion or modification activities. 6. Backup: Ensure regular, secure backups of WordPress sites and configuration files to enable rapid recovery in case of compromise. 7. Network segmentation: Isolate WordPress servers from critical internal systems to limit the impact of a potential breach. 8. Incident response readiness: Prepare incident response plans specifically addressing web application compromises and file deletion attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-12T08:37:47.770Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e74b345132fb26fe2091f7

Added to database: 10/9/2025, 5:42:12 AM

Last enriched: 10/16/2025, 8:53:16 AM

Last updated: 11/23/2025, 5:02:33 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats