CVE-2025-6043
Published: 16 July 2025
Summary
CVE-2025-6043 is a high-severity Missing Authorization (CWE-862) vulnerability in Wordpress (inferred from references). Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique File Deletion (T1070.004); ranked in the top 27.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-3 enforces approved authorizations for access to system resources, directly mitigating the missing capability check in the wpmr_delete_file() function that allows arbitrary file deletion.
AC-6 implements least privilege to restrict Subscriber-level users from accessing file deletion functions, preventing low-privileged exploitation.
SI-2 requires identification, reporting, and correction of system flaws like the missing authorization in the plugin, preventing exploitation through patching.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Missing authorization enables low-priv authenticated deletion of arbitrary server files, directly mapping to file deletion for impact or indicator removal and data destruction.
NVD Description
The Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin for WordPress is vulnerable to Arbitrary File Deletion due to a missing capability check on the wpmr_delete_file() function in all versions up to, and including, 17.0. This makes…
more
it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files making remote code execution possible. This is only exploitable when advanced mode is enabled on the site.
Deeper analysisAI
CVE-2025-6043 is an Arbitrary File Deletion vulnerability in the Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin for WordPress, affecting all versions up to and including 17.0. The issue arises from a missing capability check in the wpmr_delete_file() function, classified under CWE-862 (Missing Authorization). It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H), highlighting high-impact integrity and availability risks with low complexity and privileges required.
Authenticated attackers possessing Subscriber-level access or higher can exploit this vulnerability when advanced mode is enabled on the affected site. By invoking the wpmr_delete_file() function without proper authorization, they can delete arbitrary files on the server, which may enable remote code execution depending on the targeted files and site configuration.
Advisories reference vulnerable code locations in the plugin's WordPress Trac repository for version 16.8, specifically lines 4570, 6304, and 6401 in wpmr.php, along with a Wordfence threat intelligence report (ID: d44fe4d7-1af5-4e26-a33c-43a9cce4174c) providing further details on the issue.
Details
- CWE(s)