CVE-2025-14675
Published: 07 March 2026
Summary
CVE-2025-14675 is a high-severity Path Traversal (CWE-22) vulnerability in Wordpress (inferred from references). Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 23.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Validates pathnames and filenames to prevent traversal outside intended directories.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing WP plugin enables authenticated arbitrary file deletion (T1070.004) and facilitates initial access via exploitation of the exposed application (T1190).
NVD Description
The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_delete_file' function in all versions up to, and including, 5.11.1. This makes it possible for authenticated attackers, with Contributor-level access…
more
and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Deeper analysisAI
CVE-2025-14675 is a vulnerability in the Meta Box plugin for WordPress that enables arbitrary file deletion due to insufficient file path validation in the 'ajax_delete_file' function. It affects all versions of the plugin up to and including 5.11.1. The issue is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H).
Authenticated attackers with Contributor-level access or higher can exploit this vulnerability over the network with low complexity. By leveraging the flawed validation, they can delete arbitrary files on the server, potentially leading to remote code execution—for instance, by targeting critical files like wp-config.php.
Mitigation is addressed in advisories and patches referenced in the CVE details. A fix is available via GitHub pull request 1654 in the wpmetabox/meta-box repository, with corresponding changes in WordPress plugin trac changeset 3475210. Security practitioners should update to a version beyond 5.11.1, as detailed in the Wordfence threat intelligence report and code diffs at the provided trac locations.
Details
- CWE(s)