Cyber Posture

CVE-2025-24605

Medium

Published: 03 February 2025

Published
03 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0009 25.1th percentile
Risk Priority 10 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.

Security Summary

CVE-2025-24605 is an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability, classified as CWE-22, in the RealMag777 WOLF bulk-editor WordPress plugin. This issue affects WOLF versions from n/a through 1.0.8.5, enabling attackers to traverse path restrictions and access files outside intended directories.

The vulnerability carries a CVSS v3.1 base score of 4.9 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N), indicating network accessibility with low attack complexity but requiring high privileges, such as administrative access. An authenticated attacker with sufficient permissions can exploit it to achieve high-impact confidentiality violations, such as reading sensitive files, without affecting integrity or availability.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/bulk-editor/vulnerability/wordpress-wolf-plugin-1-0-8-5-path-traversal-vulnerability?_s_id=cve documents the path traversal issue in WOLF plugin version 1.0.8.5 and provides details relevant to mitigation for affected WordPress installations.

Details

CWE(s)
CWE-22

Affected Products

pluginus
wolf - wordpress posts bulk editor and products manager professional
≤ 1.0.8.6

MITRE ATT&CK Enterprise Techniques

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

The path traversal vulnerability directly enables reading sensitive files on the local system by bypassing directory restrictions, mapping to T1005: Data from Local System.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References