CVE-2025-5391
Published: 12 August 2025
Summary
CVE-2025-5391 is a high-severity Path Traversal (CWE-22) vulnerability in Wordpress (inferred from references). Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data Destruction (T1485); ranked in the top 20.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-6 (Least Privilege) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the path traversal vulnerability by requiring validation of file path inputs to the delete_file() function, preventing arbitrary file deletion.
Requires identification, reporting, and correction of the specific flaw in file path validation within the WooCommerce Purchase Orders plugin, enabling timely patching.
Enforces least privilege to restrict Subscriber-level users from accessing file deletion functions that could target arbitrary server files like wp-config.php.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal enables arbitrary file deletion (T1485/T1070.004) and site disruption via config deletion (T1490); RCE is indirect follow-on.
NVD Description
The WooCommerce Purchase Orders plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_file() function in all versions up to, and including, 1.0.2. This makes it possible for authenticated attackers, with Subscriber-level…
more
access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Deeper analysisAI
CVE-2025-5391 is a path traversal vulnerability (CWE-22) in the WooCommerce Purchase Orders plugin for WordPress, affecting all versions up to and including 1.0.2. The issue stems from insufficient file path validation in the delete_file() function within class-bbpo-purchase-orders-files.php, enabling arbitrary file deletion on the server. Rated at CVSS 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), it was published on 2025-08-12.
Authenticated attackers with Subscriber-level access or higher can exploit this vulnerability remotely without user interaction. By manipulating file paths, they can delete any file on the server, such as wp-config.php, potentially leading to remote code execution through site compromise or denial of service.
Mitigation details are outlined in WordPress plugin advisories, including the Wordfence threat intelligence report and plugin trac references. A patch addressing the validation flaw is available in changeset 3356360, which security practitioners should apply by updating to a fixed version of the plugin beyond 1.0.2. Source code diffs at the referenced lines in class-bbpo-purchase-orders-files.php and class-bbpo-purchase-orders.php confirm the remediation.
Details
- CWE(s)