CVE-2025-6379

The BeeTeam368 Extensions Pro plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_live_fn() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.
Configurations

Configuration 1 (hide)

cpe:2.3:a:beeteam368:vidmov:*:*:*:*:*:wordpress:*:*

History

07 Jul 2025, 15:24

Type Values Removed Values Added
CPE cpe:2.3:a:beeteam368:vidmov:*:*:*:*:*:wordpress:*:*
First Time Beeteam368 vidmov
Beeteam368
References () https://themeforest.net/item/vidmov-video-wordpress-theme/35542187 - () https://themeforest.net/item/vidmov-video-wordpress-theme/35542187 - Product, Release Notes
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/26abf509-f0a9-4849-9028-d6c42832158f?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/26abf509-f0a9-4849-9028-d6c42832158f?source=cve - Third Party Advisory

30 Jun 2025, 18:38

Type Values Removed Values Added
Summary
  • (es) El complemento BeeTeam368 Extensions Pro para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 2.3.4 incluida, a través de la función handle_live_fn(). Esto permite a atacantes autenticados, con acceso de suscriptor o superior, realizar acciones en archivos fuera del directorio original. Esta vulnerabilidad puede utilizarse para eliminar el archivo wp-config.php, lo que puede utilizarse para robar el sitio web.

28 Jun 2025, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-28 04:15

Updated : 2025-07-07 15:24


NVD link : CVE-2025-6379

Mitre link : CVE-2025-6379

CVE.ORG link : CVE-2025-6379


JSON object : View

Products Affected

beeteam368

  • vidmov
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')