Cyber Posture

CVE-2025-68862

High

Published: 20 February 2026

Published
20 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
EPSS Score 0.0007 21.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-68862 is a high-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 7.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data Destruction (T1485); ranked at the 21.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data Destruction (T1485) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents path traversal vulnerabilities by validating and sanitizing user-supplied pathnames to restrict access to authorized directories only.

prevent

Remediates the specific path traversal flaw in Woo File Dropzone through timely identification, reporting, and patching of the vulnerable plugin versions up to 1.1.7.

prevent

Enforces access control policies to limit low-privileged users from deleting arbitrary files outside intended directories, mitigating exploitation impact.

MITRE ATT&CK Enterprise TechniquesAI

T1485 Data Destruction Impact
Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

Path traversal enables arbitrary file deletion, directly facilitating data destruction (T1485) and file deletion (T1070.004) for availability impact.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Murtaza Bhurgri Woo File Dropzone woo-file-dropzone allows Path Traversal.This issue affects Woo File Dropzone: from n/a through <= 1.1.7.

Deeper analysisAI

CVE-2025-68862 is an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability, classified as CWE-22, in the Woo File Dropzone WordPress plugin by Murtaza Bhurgri. This issue affects the plugin from unknown initial versions through 1.1.7. The vulnerability has a CVSS v3.1 base score of 7.7 (AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H), indicating high severity primarily due to its impact on availability.

Low-privileged authenticated users (PR:L) can exploit the path traversal flaw over the network (AV:N) with low attack complexity and no user interaction. Exploitation changes scope (S:C) and enables arbitrary file deletion, resulting in high availability disruption (A:H) without compromising confidentiality or integrity.

The Patchstack advisory describes this as an arbitrary file deletion vulnerability in Woo File Dropzone version 1.1.7 and provides mitigation guidance at https://patchstack.com/database/Wordpress/Plugin/woo-file-dropzone/vulnerability/wordpress-woo-file-dropzone-plugin-1-1-7-arbitrary-file-deletion-vulnerability?_s_id=cve.

Details

CWE(s)

CVEs Like This One

CVE-2025-13377Shared CWE-22
CVE-2026-27040Shared CWE-22
CVE-2026-24135Shared CWE-22
CVE-2024-13897Shared CWE-22
CVE-2025-15589Shared CWE-22
CVE-2025-65879Shared CWE-22
CVE-2026-31913Shared CWE-22
CVE-2025-5391Shared CWE-22
CVE-2026-25161Shared CWE-22
CVE-2026-24969Shared CWE-22

References