vulnerability
WordPress Plugin: counter-visitor-for-woocommerce: CVE-2025-7359: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:C/A:P) | Jul 15, 2025 | Nov 6, 2025 | Nov 6, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:P)
Published
Jul 15, 2025
Added
Nov 6, 2025
Modified
Nov 6, 2025
Description
The Counter live visitors for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wcvisitor_get_block function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to delete arbitrary files on the server. NOTE: This particular vulnerability deletes all the files in a targeted arbitrary directory rather than a specified arbitrary file, which can lead to loss of data or a denial of service condition.
Solution
counter-visitor-for-woocommerce-plugin-cve-2025-7359
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.