Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7846: CWE-36 Absolute Path Traversal in vanquish WordPress User Extra Fields

0
High
VulnerabilityCVE-2025-7846cvecve-2025-7846cwe-36
Published: Fri Oct 31 2025 (10/31/2025, 06:42:56 UTC)
Source: CVE Database V5
Vendor/Project: vanquish
Product: WordPress User Extra Fields

Description

The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the save_fields() function in all versions up to, and including, 16.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

AILast updated: 10/31/2025, 06:54:25 UTC

Technical Analysis

CVE-2025-7846 is an Absolute Path Traversal vulnerability (CWE-36) found in the WordPress User Extra Fields plugin, affecting all versions up to and including 16.7. The root cause lies in the save_fields() function, which fails to properly validate file paths before performing file deletion operations. This flaw enables authenticated attackers with Subscriber-level privileges or higher to craft requests that delete arbitrary files on the server filesystem. Since WordPress Subscriber roles are typically low-privilege, this significantly lowers the barrier for exploitation. The ability to delete critical files such as wp-config.php can lead to remote code execution, as attackers may disrupt site configuration or replace files with malicious payloads. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its network attack vector, low attack complexity, required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability's characteristics make it a prime candidate for exploitation once weaponized. The plugin is widely used in WordPress environments, increasing the potential attack surface. The vulnerability was reserved in July 2025 and published in October 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their WordPress-based web infrastructure. Successful exploitation can lead to deletion of critical configuration files, resulting in website downtime, data breaches, or full system compromise through remote code execution. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR due to potential data exposure. Organizations relying on WordPress for customer-facing websites, e-commerce platforms, or internal portals are particularly vulnerable. The ease of exploitation by low-privilege users increases the likelihood of insider threats or compromised accounts being leveraged. Additionally, the widespread use of WordPress across Europe means that many organizations could be affected simultaneously, potentially leading to large-scale disruptions or coordinated attacks targeting critical sectors such as finance, healthcare, and government services.

Mitigation Recommendations

1. Immediately update the WordPress User Extra Fields plugin to a patched version once available. If no patch exists, consider disabling or uninstalling the plugin until a fix is released. 2. Restrict Subscriber-level user capabilities by auditing and minimizing user roles and permissions, ensuring only trusted users have access. 3. Implement strict file system permissions on the WordPress installation directory to prevent unauthorized file deletions by the web server user. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the save_fields() function or unusual file deletion attempts. 5. Monitor server logs and WordPress audit trails for anomalous file deletion activities or unexpected changes to critical files like wp-config.php. 6. Use file integrity monitoring tools to alert on unauthorized modifications or deletions of key files. 7. Educate administrators and users about the risks of privilege escalation and enforce strong authentication mechanisms to reduce account compromise risks. 8. Consider isolating WordPress environments using containerization or sandboxing to limit the blast radius of potential exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-07-18T20:19:32.220Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69045cb533ef7ec31284379d

Added to database: 10/31/2025, 6:52:37 AM

Last enriched: 10/31/2025, 6:54:25 AM

Last updated: 11/1/2025, 1:33:57 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats