CVE-2025-13377
Summary
CVE-2025-13377 is a critical severity vulnerability affecting the 10Web Booster WordPress plugin. It allows authenticated attackers with Subscriber-level access or higher to delete arbitrary folders on the server due to insufficient file path validation, potentially leading to data loss or a denial-of-service condition.
Technical Details
The vulnerability resides in the get_cache_dir_for_page_from_url() function within the 10Web Booster plugin. This function is responsible for determining the cache directory for a given URL. However, it lacks proper validation of the file path provided, allowing an attacker to manipulate the input to point to arbitrary directories on the server. By crafting a malicious URL, an authenticated attacker can trigger the deletion of any folder accessible to the web server user. The lack of input sanitization and path traversal protection makes this vulnerability easily exploitable.
Specifically, the function does not adequately sanitize the URL input, allowing for path traversal sequences like ../ to navigate outside the intended cache directory. When the plugin attempts to delete the cache directory based on the manipulated path, it can inadvertently delete critical system folders or website data.
Affected Products and Versions
- 10Web Booster – Website speed optimization, Cache & Page Speed optimizer plugin for WordPress versions up to and including 2.32.7
Impact Assessment
Successful exploitation of CVE-2025-13377 can have severe consequences for affected WordPress websites.
- Data Loss: Attackers can delete critical website files, leading to data loss and website malfunction.
- Denial of Service (DoS): Deletion of essential system files can render the website inaccessible, causing a denial-of-service condition.
- Website Defacement: While not the primary impact, deleting specific folders could indirectly lead to website defacement.
- Potential for Further Exploitation: In some scenarios, successful folder deletion could be a stepping stone for more advanced attacks, such as privilege escalation or remote code execution.
Remediation
Immediate Actions
- Update to the latest version: Upgrade the 10Web Booster plugin to the latest available version, which includes a fix for this vulnerability.
- Review User Roles: Limit Subscriber-level access to only necessary users. Consider implementing stricter role-based access control.
- Monitor Website Activity: Closely monitor website logs for suspicious activity, particularly requests targeting the
get_cache_dir_for_page_from_url()function.
Long-term Solutions
- Implement Robust Input Validation: Ensure all user inputs, including URLs, are thoroughly validated and sanitized to prevent path traversal attacks.
- Regular Security Audits: Conduct regular security audits of WordPress plugins and themes to identify and address potential vulnerabilities.
- Web Application Firewall (WAF): Implement a Web Application Firewall (WAF) to detect and block malicious requests targeting known vulnerabilities.
Detection & Scanning
This vulnerability can be detected by analyzing web server logs for suspicious requests containing path traversal sequences (e.g., ../) targeting the get_cache_dir_for_page_from_url() function. Security scanners and vulnerability assessment tools can also be used to identify vulnerable installations of the 10Web Booster plugin.
Scan Your Website
Secably AI Scanner can detect this and 50+ other vulnerabilities automatically.
Start Free ScanScan Your Website for Vulnerabilities
Discover security issues before attackers do. Our AI-powered scanner checks for the vulnerabilities discussed in this guide and more.
Start Free Scan