Cyber Posture

CVE-2025-4828

Critical

Published: 09 July 2025

Published
09 July 2025
Modified
14 July 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0861 92.5th percentile
Risk Priority 25 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-4828 is a critical-severity Path Traversal (CWE-22) vulnerability in Schiocco Support Board. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 7.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the vulnerability by requiring timely flaw remediation through patching the Support Board plugin to eliminate the path traversal in sb_file_delete.

prevent

Prevents exploitation of the insufficient file path validation by enforcing comprehensive input validation to block arbitrary path traversal leading to file deletion.

detect

Detects unauthorized file deletions, such as wp-config.php, through software and information integrity monitoring to identify compromise early.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

Direct exploitation of public-facing WordPress plugin via path traversal (T1190); enables arbitrary file deletion (T1070.004) leading to RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Support Board plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the sb_file_delete function in all versions up to, and including, 3.8.0. This makes it possible for attackers to delete arbitrary files…

more

on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). An attacker can leverage CVE-2025-4855 vulnerability to exploit this vulnerability unauthenticated.

Deeper analysisAI

CVE-2025-4828 is a critical vulnerability in the Support Board plugin for WordPress, affecting all versions up to and including 3.8.0. It stems from insufficient file path validation in the sb_file_delete function, enabling arbitrary file deletion on the server. This issue, classified under CWE-22 (Path Traversal), carries a CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its potential for severe impact.

Unauthenticated attackers can exploit this vulnerability by leveraging the related CVE-2025-4855 to gain the necessary access. Successful exploitation allows deletion of arbitrary files, such as wp-config.php, which can readily lead to remote code execution by disrupting site configuration and enabling further compromise.

Mitigation details are available in advisories from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/33989611-8640-4c33-a34e-14f10cd7286d?source=cve and the plugin's CodeCanyon page at https://codecanyon.net/item/support-board-help-desk-and-chat/20359943. Security practitioners should review these for patching guidance and update to a fixed version if available.

Details

CWE(s)

Affected Products

schiocco
support board
≤ 3.8.1

CVEs Like This One

CVE-2025-4855Same product: Schiocco Support Board
CVE-2026-4815Same product: Schiocco Support Board
CVE-2025-2328Shared CWE-22
CVE-2025-66251Shared CWE-22
CVE-2025-6439Shared CWE-22
CVE-2025-14344Shared CWE-22
CVE-2026-6832Shared CWE-22
CVE-2026-34728Shared CWE-22
CVE-2025-65792Shared CWE-22
CVE-2025-1336Shared CWE-22

References