CVE-2025-66428

8.8 HIGH

📋 TL;DR

A path traversal vulnerability in WebPros WordPress Toolkit before version 6.9.1 allows attackers to escalate privileges by manipulating WordPress directory names. This affects WordPress sites managed through Plesk or cPanel installations using the vulnerable WordPress Toolkit. Attackers could gain administrative access to WordPress installations.

💻 Affected Systems

Products:
  • WebPros WordPress Toolkit
Versions: All versions before 6.9.1
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress Toolkit installations in Plesk Obsidian and cPanel environments. The vulnerability is in how the toolkit handles WordPress directory names.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over WordPress sites, allowing them to install backdoors, steal sensitive data, deface websites, or use compromised sites for further attacks.

🟠

Likely Case

Privileged attackers with some access to the system could escalate to WordPress administrator privileges, compromising site integrity and potentially accessing sensitive content.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to specific WordPress installations rather than the entire hosting environment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the hosting environment. The CWE-22 (Path Traversal) classification suggests directory traversal techniques could be used.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.9.1

Vendor Advisory: https://docs.plesk.com/release-notes/obsidian/change-log/#wordpress-toolkit-6.9.1

Restart Required: No

Instructions:

1. Log into Plesk or cPanel control panel. 2. Navigate to the WordPress Toolkit section. 3. Check current version. 4. If below 6.9.1, update to version 6.9.1 or later through the control panel's update mechanism.

🔧 Temporary Workarounds

Disable WordPress Toolkit

all

Temporarily disable the WordPress Toolkit feature if immediate patching is not possible.

Restrict Access

all

Limit access to WordPress Toolkit interface to trusted administrators only.

🧯 If You Can't Patch

  • Implement strict access controls to WordPress Toolkit interface
  • Monitor for unusual WordPress administrator account creation or privilege changes

🔍 How to Verify

Check if Vulnerable:

Check WordPress Toolkit version in Plesk or cPanel control panel. If version is below 6.9.1, the system is vulnerable.

Check Version:

Check through Plesk/cPanel GUI or consult hosting provider documentation for CLI version check

Verify Fix Applied:

Confirm WordPress Toolkit version is 6.9.1 or higher in the control panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual WordPress administrator account creation
  • Unexpected privilege escalation events in WordPress
  • Suspicious directory traversal attempts in web server logs

Network Indicators:

  • Unusual administrative activity from unexpected IP addresses

SIEM Query:

Search for WordPress admin user creation events or privilege changes outside normal maintenance windows

🔗 References

📤 Share & Export