CVE-2025-7846: CWE-36 Absolute Path Traversal in vanquish WordPress User Extra Fields
The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the save_fields() function in all versions up to, and including, 16.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI Analysis
Technical Summary
CVE-2025-7846 is an Absolute Path Traversal vulnerability (CWE-36) found in the WordPress User Extra Fields plugin, affecting all versions up to and including 16.7. The root cause lies in the save_fields() function, which fails to properly validate file paths before performing file deletion operations. This flaw enables authenticated attackers with Subscriber-level privileges or higher to craft requests that delete arbitrary files on the server filesystem. Since WordPress Subscriber roles are typically low-privilege, this significantly lowers the barrier for exploitation. The ability to delete critical files such as wp-config.php can lead to remote code execution, as attackers may disrupt site configuration or replace files with malicious payloads. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its network attack vector, low attack complexity, required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability's characteristics make it a prime candidate for exploitation once weaponized. The plugin is widely used in WordPress environments, increasing the potential attack surface. The vulnerability was reserved in July 2025 and published in October 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their WordPress-based web infrastructure. Successful exploitation can lead to deletion of critical configuration files, resulting in website downtime, data breaches, or full system compromise through remote code execution. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR due to potential data exposure. Organizations relying on WordPress for customer-facing websites, e-commerce platforms, or internal portals are particularly vulnerable. The ease of exploitation by low-privilege users increases the likelihood of insider threats or compromised accounts being leveraged. Additionally, the widespread use of WordPress across Europe means that many organizations could be affected simultaneously, potentially leading to large-scale disruptions or coordinated attacks targeting critical sectors such as finance, healthcare, and government services.
Mitigation Recommendations
1. Immediately update the WordPress User Extra Fields plugin to a patched version once available. If no patch exists, consider disabling or uninstalling the plugin until a fix is released. 2. Restrict Subscriber-level user capabilities by auditing and minimizing user roles and permissions, ensuring only trusted users have access. 3. Implement strict file system permissions on the WordPress installation directory to prevent unauthorized file deletions by the web server user. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the save_fields() function or unusual file deletion attempts. 5. Monitor server logs and WordPress audit trails for anomalous file deletion activities or unexpected changes to critical files like wp-config.php. 6. Use file integrity monitoring tools to alert on unauthorized modifications or deletions of key files. 7. Educate administrators and users about the risks of privilege escalation and enforce strong authentication mechanisms to reduce account compromise risks. 8. Consider isolating WordPress environments using containerization or sandboxing to limit the blast radius of potential exploits.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7846: CWE-36 Absolute Path Traversal in vanquish WordPress User Extra Fields
Description
The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the save_fields() function in all versions up to, and including, 16.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI-Powered Analysis
Technical Analysis
CVE-2025-7846 is an Absolute Path Traversal vulnerability (CWE-36) found in the WordPress User Extra Fields plugin, affecting all versions up to and including 16.7. The root cause lies in the save_fields() function, which fails to properly validate file paths before performing file deletion operations. This flaw enables authenticated attackers with Subscriber-level privileges or higher to craft requests that delete arbitrary files on the server filesystem. Since WordPress Subscriber roles are typically low-privilege, this significantly lowers the barrier for exploitation. The ability to delete critical files such as wp-config.php can lead to remote code execution, as attackers may disrupt site configuration or replace files with malicious payloads. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its network attack vector, low attack complexity, required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the vulnerability's characteristics make it a prime candidate for exploitation once weaponized. The plugin is widely used in WordPress environments, increasing the potential attack surface. The vulnerability was reserved in July 2025 and published in October 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their WordPress-based web infrastructure. Successful exploitation can lead to deletion of critical configuration files, resulting in website downtime, data breaches, or full system compromise through remote code execution. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR due to potential data exposure. Organizations relying on WordPress for customer-facing websites, e-commerce platforms, or internal portals are particularly vulnerable. The ease of exploitation by low-privilege users increases the likelihood of insider threats or compromised accounts being leveraged. Additionally, the widespread use of WordPress across Europe means that many organizations could be affected simultaneously, potentially leading to large-scale disruptions or coordinated attacks targeting critical sectors such as finance, healthcare, and government services.
Mitigation Recommendations
1. Immediately update the WordPress User Extra Fields plugin to a patched version once available. If no patch exists, consider disabling or uninstalling the plugin until a fix is released. 2. Restrict Subscriber-level user capabilities by auditing and minimizing user roles and permissions, ensuring only trusted users have access. 3. Implement strict file system permissions on the WordPress installation directory to prevent unauthorized file deletions by the web server user. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the save_fields() function or unusual file deletion attempts. 5. Monitor server logs and WordPress audit trails for anomalous file deletion activities or unexpected changes to critical files like wp-config.php. 6. Use file integrity monitoring tools to alert on unauthorized modifications or deletions of key files. 7. Educate administrators and users about the risks of privilege escalation and enforce strong authentication mechanisms to reduce account compromise risks. 8. Consider isolating WordPress environments using containerization or sandboxing to limit the blast radius of potential exploits.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-18T20:19:32.220Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69045cb533ef7ec31284379d
Added to database: 10/31/2025, 6:52:37 AM
Last enriched: 10/31/2025, 6:54:25 AM
Last updated: 11/1/2025, 1:33:57 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-36367: CWE-862 Missing Authorization
HighCVE-2025-6990: CWE-94 Improper Control of Generation of Code ('Code Injection') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
HighCVE-2025-6988: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
MediumCVE-2025-6574: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
HighCVE-2025-12171: CWE-434 Unrestricted Upload of File with Dangerous Type in anthonyeden RESTful Content Syndication
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.