Cyber Posture

CVE-2025-10897

High

Published: 31 October 2025

Published
31 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.2258 95.9th percentile
Risk Priority 31 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-10897 is a high-severity Path Traversal (CWE-22) vulnerability in Codecanyon (inferred from references). Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 4.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation requires patching the arbitrary file read vulnerability in WooCommerce Designer Pro theme versions up to 1.9.28 to prevent unauthenticated exploitation.

prevent

Information input validation directly counters path traversal inputs enabling arbitrary file reads such as wp-config.php on WordPress servers.

preventdetect

Vulnerability monitoring and scanning identifies the high-severity CVE-2025-10897 in deployed WooCommerce Designer Pro themes, enabling timely remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Arbitrary file read in public-facing WordPress theme enables T1190 (exploit public-facing app). Directly facilitates reading local files for T1005 (data from local system) and exposes credentials in files like wp-config.php for T1552.001.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The WooCommerce Designer Pro theme for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.9.28. This makes it possible for unauthenticated attackers to read arbitrary files on the server, which can expose DB credentials…

more

when the wp-config.php file is read.

Deeper analysisAI

CVE-2025-10897 is an arbitrary file read vulnerability (CWE-22) in the WooCommerce Designer Pro theme for WordPress, affecting all versions up to and including 1.9.28. Published on 2025-10-31, it enables attackers to access arbitrary files on the server, such as wp-config.php, potentially exposing database credentials and other sensitive configuration data. The issue carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N), indicating high severity due to its network accessibility, low attack complexity, and lack of prerequisites.

Unauthenticated attackers can exploit this vulnerability remotely without privileges or user interaction. By leveraging the flaw, they achieve high-impact confidentiality breaches, reading any server file accessible to the web server process, which could lead to full site compromise through credential theft or further privilege escalation.

Advisories reference the WooCommerce Designer Pro theme product page on Codecanyon and Wordfence threat intelligence detailing the vulnerability (ID: 3a47cdeb-bd05-4e7e-99dc-dca67064182a). Security practitioners should consult these sources for patching guidance, as no specific mitigation steps are outlined in the core CVE details.

Details

CWE(s)

Affected Products

Codecanyon
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-3585Shared CWE-22
CVE-2026-26217Shared CWE-22
CVE-2026-30403Shared CWE-22
CVE-2026-28679Shared CWE-22
CVE-2026-30869Shared CWE-22
CVE-2026-33077Shared CWE-22
CVE-2026-35615Shared CWE-22
CVE-2026-30976Shared CWE-22
CVE-2026-1557Shared CWE-22
CVE-2026-27305Shared CWE-22

References