CVE-2025-4828
Published: 09 July 2025
Summary
CVE-2025-4828 is a critical-severity Path Traversal (CWE-22) vulnerability in Schiocco Support Board. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 7.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the vulnerability by requiring timely flaw remediation through patching the Support Board plugin to eliminate the path traversal in sb_file_delete.
Prevents exploitation of the insufficient file path validation by enforcing comprehensive input validation to block arbitrary path traversal leading to file deletion.
Detects unauthorized file deletions, such as wp-config.php, through software and information integrity monitoring to identify compromise early.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct exploitation of public-facing WordPress plugin via path traversal (T1190); enables arbitrary file deletion (T1070.004) leading to RCE.
NVD Description
The Support Board plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the sb_file_delete function in all versions up to, and including, 3.8.0. This makes it possible for attackers to delete arbitrary files…
more
on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). An attacker can leverage CVE-2025-4855 vulnerability to exploit this vulnerability unauthenticated.
Deeper analysisAI
CVE-2025-4828 is a critical vulnerability in the Support Board plugin for WordPress, affecting all versions up to and including 3.8.0. It stems from insufficient file path validation in the sb_file_delete function, enabling arbitrary file deletion on the server. This issue, classified under CWE-22 (Path Traversal), carries a CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its potential for severe impact.
Unauthenticated attackers can exploit this vulnerability by leveraging the related CVE-2025-4855 to gain the necessary access. Successful exploitation allows deletion of arbitrary files, such as wp-config.php, which can readily lead to remote code execution by disrupting site configuration and enabling further compromise.
Mitigation details are available in advisories from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/33989611-8640-4c33-a34e-14f10cd7286d?source=cve and the plugin's CodeCanyon page at https://codecanyon.net/item/support-board-help-desk-and-chat/20359943. Security practitioners should review these for patching guidance and update to a fixed version if available.
Details
- CWE(s)