CVE-2025-7667
Published: 15 July 2025
Summary
CVE-2025-7667 is a high-severity CSRF (CWE-352) vulnerability in Wordpress (inferred from references). Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 37.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the missing nonce validation by requiring input validation mechanisms on state-changing requests like file deletion in the plugin's admin page.
Protects session authenticity with anti-CSRF measures such as unique tokens, preventing forged requests that trick administrators into deleting files.
Mandates timely flaw remediation by updating the Restrict File Access plugin beyond version 1.1.2 to include proper nonce checks.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CSRF vuln in public-facing WordPress plugin directly enables exploitation of the app (T1190) to perform arbitrary file deletion (T1485), with RCE potential via critical config files.
NVD Description
The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'restrict-file-access' page. This makes it possible for unauthenticated…
more
attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Deeper analysisAI
CVE-2025-7667 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, affecting the Restrict File Access plugin for WordPress in all versions up to and including 1.1.2. The issue stems from missing or incorrect nonce validation on the 'restrict-file-access' page, with a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H). Published on 2025-07-15, it enables unauthorized file deletion on the server.
Unauthenticated attackers can exploit this vulnerability by crafting a forged request that tricks a site administrator into performing an action, such as clicking a malicious link. Successful exploitation allows deletion of arbitrary files, potentially leading to remote code execution if critical files like wp-config.php are targeted.
Advisories, including Wordfence threat intelligence and the plugin's source code at admin.php line 78, highlight the lack of nonce checks as the root cause, urging administrators to review and update the plugin beyond version 1.1.2 for mitigation.
Details
- CWE(s)