Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7712: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MangaBooth Madara - Core

0
Critical
VulnerabilityCVE-2025-7712cvecve-2025-7712cwe-22
Published: Thu Jul 17 2025 (07/17/2025, 02:24:33 UTC)
Source: CVE Database V5
Vendor/Project: MangaBooth
Product: Madara - Core

Description

The Madara - Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wp_manga_delete_zip() function in all versions up to, and including, 2.2.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:31:41 UTC

Technical Analysis

The vulnerability identified as CVE-2025-7712 affects the Madara - Core plugin for WordPress, developed by MangaBooth. This plugin suffers from a path traversal flaw (CWE-22) in the wp_manga_delete_zip() function, which fails to properly validate and restrict file paths when deleting zip files. As a result, an unauthenticated attacker can craft requests that traverse directories and delete arbitrary files on the web server. Since the vulnerability requires no authentication or user interaction, it is highly accessible to remote attackers. The deletion of critical files such as wp-config.php can disrupt the WordPress site’s configuration, potentially allowing attackers to execute arbitrary code or cause denial of service. The CVSS v3.1 score of 9.1 reflects the vulnerability’s critical nature, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no exploits have been observed in the wild yet, the plugin’s widespread use in WordPress ecosystems makes this a significant threat. The absence of official patches at the time of disclosure increases the urgency for mitigations. This vulnerability highlights the risks of insufficient input validation in file operations within web applications, especially in popular CMS plugins.

Potential Impact

The impact of CVE-2025-7712 is severe for organizations running WordPress sites with the Madara - Core plugin. Successful exploitation allows attackers to delete arbitrary files on the server, which can lead to site downtime, data loss, and compromise of site integrity. Deletion of configuration files like wp-config.php can enable attackers to gain remote code execution capabilities, escalating the attack to full server compromise. This can result in data breaches, defacement, malware deployment, or use of the server in botnets. The vulnerability’s unauthenticated nature means attackers can exploit it without credentials, increasing the risk of widespread attacks. Organizations relying on this plugin for content delivery or e-commerce may face significant operational disruption and reputational damage. Additionally, recovery may require restoring from backups and extensive forensic analysis, increasing remediation costs and downtime.

Mitigation Recommendations

Immediate mitigation steps include disabling or removing the Madara - Core plugin until a security patch is released. If disabling is not feasible, restrict access to the vulnerable wp_manga_delete_zip() function by implementing web application firewall (WAF) rules that block suspicious requests containing path traversal patterns such as '../'. Employ strict input validation and sanitization at the web server or application firewall level to prevent directory traversal attempts. Regularly back up WordPress site files and databases to enable rapid recovery if files are deleted. Monitor server logs for unusual file deletion requests or errors related to the plugin. Limit file system permissions for the web server user to the minimum necessary, preventing deletion of critical files outside the plugin’s directory. Once a patch is available, apply it promptly and verify the fix. Additionally, consider isolating WordPress instances in containerized or sandboxed environments to limit the blast radius of potential exploits.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-16T14:00:25.831Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68786778a83201eaace11810

Added to database: 7/17/2025, 3:01:12 AM

Last enriched: 2/26/2026, 4:31:41 PM

Last updated: 3/24/2026, 5:49:08 AM

Views: 190

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses