Cyber Posture

CVE-2025-14301

Critical

Published: 14 January 2026

Published
14 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0008 23.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-14301 is a critical-severity Path Traversal (CWE-22) vulnerability in Wordpress (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as Other AI Platforms.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of user-supplied file paths in the wsaw-log[] POST parameter to block path traversal exploitation.

prevent

Enforces authentication and authorization prior to processing bulk file actions, preventing unauthenticated arbitrary file deletion or download.

prevent

Mandates timely identification, reporting, and patching of the path traversal flaw in the plugin to eliminate the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
Why these techniques?

Path traversal in public WordPress plugin enables remote unauthenticated file read (T1005), deletion (T1485), and direct exploitation of exposed app (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Integration Opvius AI for WooCommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.3.0. This is due to the `process_table_bulk_actions()` function processing user-supplied file paths without authentication checks, nonce verification, or path…

more

validation. This makes it possible for unauthenticated attackers to delete or download arbitrary files on the server via the `wsaw-log[]` POST parameter, which can be leveraged to delete critical files like `wp-config.php` or read sensitive configuration files.

Deeper analysisAI

The Integration Opvius AI for WooCommerce plugin for WordPress, in all versions up to and including 1.3.0, contains a path traversal vulnerability (CWE-22) stemming from the `process_table_bulk_actions()` function in the logger module. This function processes user-supplied file paths via the `wsaw-log[]` POST parameter without authentication checks, nonce verification, or path validation, enabling arbitrary file operations on the server. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-01-14.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity. By sending crafted POST requests with malicious paths in the `wsaw-log[]` parameter, they can delete critical files such as `wp-config.php` or download sensitive configuration files, potentially leading to full server compromise, data exfiltration, or denial of service.

Advisories and references, including Wordfence threat intelligence and WordPress plugin Trac browser links to the affected code in `class-module-logger-hook.php` (lines 25, 41, 79, and 160), highlight the lack of input sanitization in the bulk action handler. Security practitioners should review these sources for detailed code analysis and update to patched versions beyond 1.3.0 where available.

As an AI integration plugin for WooCommerce, this vulnerability underscores risks in third-party AI extensions for WordPress, though no real-world exploitation details are specified in available data.

Details

CWE(s)

Affected Products

Wordpress
inferred from references and description; NVD did not file a CPE for this CVE

AI Security AnalysisAI

AI Category
Other AI Platforms
Risk Domain
N/A
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: ai

CVEs Like This One

CVE-2026-35167Shared CWE-22
CVE-2026-23482Shared CWE-22
CVE-2026-29871Shared CWE-22
CVE-2026-33497Shared CWE-22
CVE-2026-5478Shared CWE-22
CVE-2025-50857Shared CWE-22
CVE-2026-26321Shared CWE-22
CVE-2026-24478Shared CWE-22
CVE-2026-25592Shared CWE-22
CVE-2024-54291Shared CWE-22

References