CVE-2025-7359

8.2 HIGH

📋 TL;DR

The Counter live visitors for WooCommerce WordPress plugin has an arbitrary file deletion vulnerability that allows unauthenticated attackers to delete all files in any directory on the server. This affects all WordPress sites using the plugin version 1.3.6 or earlier. Attackers can cause complete data loss or denial of service by wiping critical directories.

💻 Affected Systems

Products:
  • Counter live visitors for WooCommerce WordPress plugin
Versions: All versions up to and including 1.3.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through deletion of system files, website destruction with all data loss, and permanent denial of service requiring full server restoration from backups.

🟠

Likely Case

Website defacement or destruction by deleting WordPress core files, plugin files, or upload directories, causing extended downtime and data loss.

🟢

If Mitigated

Limited impact if proper file permissions restrict write access to web user, but still potential for deleting web-accessible content.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit with basic HTTP requests and requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.7 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3200000%40counter-visitor-for-woocommerce%2Ftrunk&old=3199999%40counter-visitor-for-woocommerce%2Ftrunk

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Counter live visitors for WooCommerce'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 1.3.7+ from WordPress.org and replace the plugin files.

🔧 Temporary Workarounds

Disable or remove vulnerable plugin

all

Temporarily disable or completely remove the vulnerable plugin until patched.

wp plugin deactivate counter-visitor-for-woocommerce
wp plugin delete counter-visitor-for-woocommerce

Restrict web server file permissions

linux

Set restrictive file permissions to prevent web user from deleting critical files.

chmod 755 /var/www/html
chmod 644 /var/www/html/*.php
chown root:root /var/www/html/wp-config.php

🧯 If You Can't Patch

  • Immediately disable the Counter live visitors for WooCommerce plugin via WordPress admin or command line.
  • Implement web application firewall rules to block requests to the vulnerable wcvisitor_get_block function.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin plugins page for 'Counter live visitors for WooCommerce' version 1.3.6 or lower.

Check Version:

wp plugin get counter-visitor-for-woocommerce --field=version

Verify Fix Applied:

Confirm plugin version is 1.3.7 or higher in WordPress admin or via wp-cli: wp plugin get counter-visitor-for-woocommerce --field=version

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php with action=wcvisitor_get_block containing directory traversal patterns
  • Web server error logs showing 'No such file or directory' errors for unexpected file deletions
  • WordPress debug logs showing file operation errors

Network Indicators:

  • Unusual HTTP requests to admin-ajax.php with directory traversal payloads
  • Multiple DELETE or file operation requests from single IP

SIEM Query:

source="web_server_logs" AND (uri="/wp-admin/admin-ajax.php" AND parameters CONTAINS "wcvisitor_get_block") AND (parameters CONTAINS "../" OR parameters CONTAINS "/etc/" OR parameters CONTAINS "/root/")

🔗 References

📤 Share & Export