Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7778: CWE-285 Improper Authorization in artkrylov Icons Factory

0
Critical
VulnerabilityCVE-2025-7778cvecve-2025-7778cwe-285
Published: Fri Aug 15 2025 (08/15/2025, 08:25:39 UTC)
Source: CVE Database V5
Vendor/Project: artkrylov
Product: Icons Factory

Description

The Icons Factory plugin for WordPress is vulnerable to Arbitrary File Deletion due to insufficient authorization and improper path validation within the delete_files() function in all versions up to, and including, 1.6.12. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:35:41 UTC

Technical Analysis

CVE-2025-7778 is a critical security vulnerability identified in the Icons Factory plugin for WordPress, developed by artkrylov. The flaw resides in the delete_files() function, which suffers from improper authorization checks and insufficient path validation. This allows an unauthenticated attacker to invoke the file deletion functionality and specify arbitrary file paths for deletion on the server hosting the WordPress site. Because the plugin does not verify the user's permissions before executing file deletions, attackers can delete any file accessible by the web server process. This includes sensitive files such as wp-config.php, which contains database credentials and other configuration details. Deleting such files can lead to remote code execution (RCE) by enabling attackers to disrupt site functionality or upload malicious payloads through subsequent exploitation steps. The vulnerability affects all versions of the plugin up to and including 1.6.12. The CVSS v3.1 base score is 9.8 (critical), reflecting the ease of exploitation (no authentication or user interaction required), the high impact on confidentiality, integrity, and availability, and the broad scope of affected systems. Although no active exploits have been reported in the wild, the severity and simplicity of exploitation make this a high-priority threat. The vulnerability was reserved in July 2025 and published in August 2025. No official patches or updates are currently linked, indicating that users must monitor vendor communications closely or apply manual mitigations.

Potential Impact

The impact of CVE-2025-7778 is severe for organizations running WordPress sites with the vulnerable Icons Factory plugin. Successful exploitation allows attackers to delete arbitrary files on the web server without authentication, potentially leading to complete site compromise. Critical files such as wp-config.php can be deleted, causing site outages and enabling remote code execution through subsequent attack vectors. This compromises the confidentiality of sensitive data (e.g., database credentials), the integrity of website content and configurations, and the availability of the web service. For organizations relying on WordPress for business operations, e-commerce, or customer engagement, this can result in significant downtime, data breaches, reputational damage, and financial losses. The vulnerability also increases the attack surface for further exploitation, including malware deployment and lateral movement within the hosting environment. Given WordPress's widespread use globally, the threat has broad implications for website security and trust.

Mitigation Recommendations

To mitigate CVE-2025-7778, organizations should take immediate and specific actions beyond generic advice: 1) Disable or uninstall the Icons Factory plugin until a secure patched version is released. 2) If disabling is not feasible, restrict access to the plugin’s file deletion functionality by implementing web application firewall (WAF) rules that block unauthorized requests targeting the delete_files() endpoint or parameters. 3) Harden file system permissions to ensure the web server process has minimal rights, preventing deletion of critical files like wp-config.php. 4) Monitor web server and WordPress logs for suspicious deletion attempts or unusual file access patterns. 5) Regularly back up WordPress files and databases to enable rapid recovery in case of file deletion or compromise. 6) Stay updated with vendor advisories and apply official patches immediately once available. 7) Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts of this vulnerability. 8) Educate site administrators about the risks of installing unverified plugins and the importance of timely updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-17T22:02:28.623Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689ef436ad5a09ad00697347

Added to database: 8/15/2025, 8:47:50 AM

Last enriched: 2/26/2026, 4:35:41 PM

Last updated: 3/23/2026, 12:21:44 AM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses