Cyber Posture

CVE-2025-6439

Critical

Published: 11 October 2025

Published
11 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0164 82.1th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-6439 is a critical-severity Path Traversal (CWE-22) vulnerability in Codecanyon (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the insufficient file path validation in the wcdp_save_canvas_design_ajax function, preventing path traversal attacks that enable arbitrary file deletion.

prevent

Ensures timely flaw remediation by requiring patching or removal of the vulnerable WooCommerce Designer Pro plugin versions up to 1.9.26.

preventdetect

Boundary protection at web interfaces can monitor and block path traversal payloads exploiting the unauthenticated AJAX endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

T1190: Unauthenticated path traversal in public-facing WordPress plugin enables exploitation of public-facing application. T1070.004: Vulnerability directly allows arbitrary file deletion on the server.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The WooCommerce Designer Pro plugin for WordPress, used by the Pricom - Printing Company & Design Services WordPress theme, is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'wcdp_save_canvas_design_ajax' function in all versions up to,…

more

and including, 1.9.26. This makes it possible for unauthenticated attackers to delete all files in an arbitrary directory on the server, which can lead to remote code execution, data loss, or site unavailability.

Deeper analysisAI

CVE-2025-6439 is a critical vulnerability in the WooCommerce Designer Pro plugin for WordPress, specifically used by the Pricom - Printing Company & Design Services WordPress theme. It stems from insufficient file path validation in the 'wcdp_save_canvas_design_ajax' function, enabling arbitrary file deletion across all versions up to and including 1.9.26. This path traversal issue, classified under CWE-22, has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its severe impact potential.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges required. By leveraging the flawed AJAX endpoint, they can delete all files in any arbitrary directory on the server, potentially resulting in remote code execution, significant data loss, or complete site unavailability.

Advisories from Wordfence provide detailed threat intelligence on the vulnerability (https://www.wordfence.com/threat-intel/vulnerabilities/id/407a0bc3-2775-4a34-9817-924bf94a4f94?source=cve), while the plugin listing on Codecanyon (https://codecanyon.net/item/woocommerce-designer-pro-cmyk-card-flyer/22027731) serves as the primary source for the affected software. Security practitioners should check these resources for any available patches or updates beyond version 1.9.26.

Details

CWE(s)

Affected Products

Codecanyon
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-2328Shared CWE-22
CVE-2025-66251Shared CWE-22
CVE-2025-14344Shared CWE-22
CVE-2026-6832Shared CWE-22
CVE-2026-34728Shared CWE-22
CVE-2025-65792Shared CWE-22
CVE-2025-1336Shared CWE-22
CVE-2025-66410Shared CWE-22
CVE-2025-14675Shared CWE-22
CVE-2026-41058Shared CWE-22

References