CVE-2025-10494
Published: 08 October 2025
Summary
CVE-2025-10494 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Wordpress (inferred from references). Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the insufficient file path validation that enables path traversal for arbitrary file deletion in the plugin.
Requires timely identification, reporting, and patching of the specific flaw in the Motors plugin up to version 1.4.89.
Enforces logical access controls to restrict unauthorized file deletion operations even if path validation is bypassed.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows exploitation of a public-facing WordPress plugin (T1190) to perform arbitrary file deletion (T1070.004), directly enabling indicator removal or disruption.
NVD Description
The Motors – Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation when deleting profile pictures in all versions up to, and including, 1.4.89. This makes it possible…
more
for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Deeper analysisAI
CVE-2025-10494 affects the Motors – Car Dealership & Classified Listings Plugin for WordPress in all versions up to and including 1.4.89. The vulnerability stems from insufficient file path validation when deleting profile pictures, enabling arbitrary file deletion on the server. It has a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H) and is associated with CWE-73 (External Control of File Name or Path).
Authenticated attackers with Subscriber-level access or higher can exploit this issue remotely without user interaction. By manipulating the file deletion process, they can target and remove arbitrary files, such as wp-config.php, potentially leading to remote code execution through server misconfiguration or denial of critical functionality.
Mitigation information is provided in advisories from Wordfence and a corresponding patch in the plugin's WordPress trac repository (changeset from revision 3367132 to 3369415). Security practitioners should update to a patched version beyond 1.4.89 and review access controls for low-privilege users.
Details
- CWE(s)