CVE-2025-7526 (CNNVD-202510-1219)
中文标题:
WordPress plugin WP Travel Engine 路径遍历漏洞
英文标题:
WP Travel Engine – Tour Booking Plugin – Tour Operator Software <= 6.6.7 - Authenticated (Subscriber+) Arbitrary File Deletion via File Renaming
漏洞描述
中文描述:
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台具有在基于PHP和MySQL的服务器上架设个人博客网站的功能。WordPress plugin是一个应用插件。 WordPress plugin WP Travel Engine 6.6.7及之前版本存在路径遍历漏洞,该漏洞源于set_user_profile_image函数中文件路径验证不足,可能导致任意文件删除和远程代码执行。
英文描述:
The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to arbitrary file deletion (via renaming) due to insufficient file path validation in the set_user_profile_image function in all versions up to, and including, 6.6.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| wptravelengine | WP Travel Engine – Tour Booking Plugin – Tour Operator Software | - | ≤ 6.6.7 | - |
cpe:2.3:a:wptravelengine:wp_travel_engine_–_tour_booking_plugin_–_tour_operator_software:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
3.1 (cna)
CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-7526 |
2025-11-11 15:23:36 | 2025-11-11 07:40:51 |
| NVD | nvd_CVE-2025-7526 |
2025-11-11 15:01:05 | 2025-11-11 07:48:38 |
| CNNVD | cnnvd_CNNVD-202510-1219 |
2025-11-11 15:12:27 | 2025-11-11 08:00:16 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 路径遍历
- cnnvd_id: 未提取 -> CNNVD-202510-1219
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']