CVE-2025-7778
Published: 15 August 2025
Summary
CVE-2025-7778 is a critical-severity Improper Authorization (CWE-285) vulnerability in Wordpress (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 33.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly mitigates the arbitrary file deletion vulnerability by identifying, reporting, and patching the flawed delete_files() function in the Icons Factory plugin.
Access enforcement addresses the insufficient authorization in delete_files(), preventing unauthenticated attackers from deleting arbitrary files.
Information input validation enforces proper path validation in delete_files(), blocking arbitrary file paths that enable server file deletion.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote unauthenticated exploitation of public-facing WordPress plugin (T1190) via flawed delete_files() enabling arbitrary file deletion (T1070.004), which can lead to RCE/full compromise.
NVD Description
The Icons Factory plugin for WordPress is vulnerable to Arbitrary File Deletion due to insufficient authorization and improper path validation within the delete_files() function in all versions up to, and including, 1.6.12. This makes it possible for unauthenticated attackers to…
more
to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Deeper analysisAI
CVE-2025-7778 is an arbitrary file deletion vulnerability in the Icons Factory plugin for WordPress, affecting all versions up to and including 1.6.12. The flaw arises from insufficient authorization and improper path validation in the delete_files() function, enabling attackers to delete arbitrary files on the server. Published on 2025-08-15, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-285 (Improper Authorization).
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction. By leveraging the flawed delete_files() function, they can target and remove any file on the server, such as wp-config.php, which can readily result in remote code execution and full server compromise.
Mitigation guidance and additional details are available in advisories from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/24f31bbf-883f-4903-847a-7bfc3e45654c?source=cve, the plugin's developer section on WordPress.org at https://wordpress.org/plugins/icons-factory/#developers, and the vulnerable source code in the plugin's Trac repository at https://plugins.trac.wordpress.org/browser/icons-factory/tags/1.6.12/icons-factory.php#L1330.
Details
- CWE(s)