CVE-2025-69097

8.1 HIGH

📋 TL;DR

This path traversal vulnerability in VibeThemes WPLMS plugin allows attackers to delete arbitrary files on WordPress sites. It affects all WordPress installations using WPLMS plugin versions up to and including 1.9.9.5.4. Attackers can exploit this to delete critical system files or website content.

💻 Affected Systems

Products:
  • VibeThemes WPLMS WordPress Plugin
Versions: All versions up to and including 1.9.9.5.4
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress sites with WPLMS plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete website compromise through deletion of WordPress core files, configuration files, or database files, leading to site unavailability and potential data loss.

🟠

Likely Case

Selective file deletion causing website functionality disruption, content loss, or defacement by removing theme/plugin files.

🟢

If Mitigated

Limited impact if file permissions are restrictive and web server runs with minimal privileges, though some disruption still possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access (likely authenticated), but path traversal vulnerabilities are typically easy to exploit once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9.9.5.5 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/wplms_plugin/vulnerability/wordpress-wplms-plugin-1-9-9-5-4-arbitrary-file-deletion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find WPLMS plugin and check for updates. 4. Update to version 1.9.9.5.5 or later. 5. If no update available, deactivate and remove the plugin.

🔧 Temporary Workarounds

Disable WPLMS Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate wplms_plugin

Restrict File Permissions

linux

Set restrictive permissions on WordPress directories to limit damage

chmod 755 wp-content
chmod 644 wp-config.php

🧯 If You Can't Patch

  • Deactivate and remove the WPLMS plugin entirely
  • Implement web application firewall (WAF) rules to block path traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for WPLMS version. If version is 1.9.9.5.4 or lower, you are vulnerable.

Check Version:

wp plugin get wplms_plugin --field=version

Verify Fix Applied:

After updating, verify WPLMS plugin version shows 1.9.9.5.5 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion attempts in web server logs
  • Requests containing '../' patterns targeting WPLMS endpoints
  • 404 errors for files that should exist

Network Indicators:

  • HTTP requests with path traversal sequences to WPLMS plugin URLs

SIEM Query:

source="web_server_logs" AND (uri="*wplms*" AND uri="*../*")

🔗 References

📤 Share & Export