Skip to main content

CVE-2025-9048: CWE-73 External Control of File Name or Path in wptobe Wptobe-memberships

High
VulnerabilityCVE-2025-9048cvecve-2025-9048cwe-73
Published: Sat Aug 23 2025 (08/23/2025, 04:25:46 UTC)
Source: CVE Database V5
Vendor/Project: wptobe
Product: Wptobe-memberships

Description

The Wptobe-memberships plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the del_img_ajax_call() function in all versions up to, and including, 3.4.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

AI-Powered Analysis

AILast updated: 08/23/2025, 04:47:47 UTC

Technical Analysis

CVE-2025-9048 is a high-severity vulnerability affecting the Wptobe-memberships plugin for WordPress, present in all versions up to and including 3.4.2. The vulnerability arises from insufficient validation of file paths in the del_img_ajax_call() function, which allows authenticated users with Subscriber-level access or higher to perform arbitrary file deletion on the server hosting the WordPress site. This vulnerability is classified under CWE-73 (External Control of File Name or Path), indicating that user-controlled input is improperly sanitized or validated before being used in file operations. Exploiting this flaw, an attacker can delete critical files such as wp-config.php, which can lead to remote code execution (RCE) by destabilizing the application or enabling further malicious actions. The CVSS v3.1 base score is 8.1, reflecting a high impact due to network attack vector, low attack complexity, privileges required at a low level (Subscriber), no user interaction needed, and significant impact on integrity and availability. Although no known exploits are currently reported in the wild, the vulnerability's nature and ease of exploitation make it a serious threat to WordPress sites using this plugin. The absence of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. This vulnerability specifically targets WordPress installations with the Wptobe-memberships plugin, which is used to manage memberships and subscriptions, making it attractive for attackers aiming to disrupt or take over membership-based websites.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with membership functionalities powered by the Wptobe-memberships plugin. The ability for low-privilege users to delete arbitrary files can lead to website defacement, data loss, service disruption, and potentially full server compromise through remote code execution. This can result in loss of customer trust, regulatory non-compliance (e.g., GDPR violations due to data integrity and availability issues), and financial damage from downtime or remediation costs. Organizations in sectors such as e-commerce, education, and membership-based services are particularly vulnerable. Additionally, the exploitation of this vulnerability could be leveraged in targeted attacks against European entities, especially those with public-facing membership portals, potentially impacting critical infrastructure or sensitive data. The high CVSS score and ease of exploitation underline the urgency for European organizations to assess their exposure and implement mitigations promptly.

Mitigation Recommendations

1. Immediate audit of WordPress installations to identify the presence of the Wptobe-memberships plugin and confirm the version in use. 2. Restrict Subscriber-level user capabilities where possible, limiting file deletion or administrative actions within the WordPress environment. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the del_img_ajax_call() function or unusual file deletion attempts. 4. Employ file integrity monitoring to detect unauthorized file deletions or modifications, especially for critical files like wp-config.php. 5. Isolate WordPress installations in hardened environments with strict file system permissions to prevent unauthorized file deletions from affecting the broader server. 6. Monitor logs for anomalous activity related to file deletion or privilege escalation attempts. 7. Engage with the plugin vendor or community to obtain or develop patches; if unavailable, consider disabling or replacing the plugin until a secure version is released. 8. Educate administrators and users about the risks of granting Subscriber-level access and enforce strong authentication and access controls. 9. Regularly back up WordPress sites and databases to enable rapid recovery in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-14T19:33:35.186Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a94470ad5a09ad0026955b

Added to database: 8/23/2025, 4:32:48 AM

Last enriched: 8/23/2025, 4:47:47 AM

Last updated: 8/23/2025, 4:47:47 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats