Platform
wordpress
Component
beeteam368-extensions-pro
Fixed in
2.3.5
CVE-2025-6379 is a critical Directory Traversal vulnerability discovered in the BeeTeam368 Extensions Pro plugin for WordPress. This flaw allows authenticated attackers with Subscriber-level access or higher to access and potentially manipulate files outside of the plugin's intended directory, posing a significant risk to WordPress sites. The vulnerability affects versions 0.0.0 through 2.3.4, and a patch is available in version 2.3.5.
The Directory Traversal vulnerability in BeeTeam368 Extensions Pro allows an authenticated attacker to bypass access controls and read or write files on the server. The most severe impact is the potential deletion of the wp-config.php file, which contains sensitive database credentials and configuration settings. Successful deletion of this file effectively leads to a complete site takeover, granting the attacker full control over the WordPress installation. Beyond wp-config.php, an attacker could potentially access other sensitive files, including database backups, theme files, and plugin code, leading to data breaches and further compromise. This vulnerability shares similarities with other WordPress plugin vulnerabilities where improper file handling leads to unauthorized access.
CVE-2025-6379 was publicly disclosed on 2025-06-28. The vulnerability's severity is rated HIGH (CVSS: 8.8). Currently, there are no publicly available exploits or reports of active exploitation campaigns. It is not listed on the CISA KEV catalog at the time of this writing. The relatively recent disclosure suggests that attackers may be actively researching and developing exploits.
Exploit Status
EPSS
0.24% (47% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2025-6379 is to immediately upgrade the BeeTeam368 Extensions Pro plugin to version 2.3.5 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily restricting access to the affected plugin functionality. While not a complete solution, implementing a Web Application Firewall (WAF) with rules to block requests containing directory traversal sequences (e.g., ../) can provide an additional layer of defense. Regularly review file permissions and ensure that the WordPress installation follows security best practices, limiting write access to necessary directories. After upgrading, confirm the fix by attempting to access files outside the intended plugin directory via a web browser or API request; access should be denied.
Actualice el plugin BeeTeam368 Extensions Pro a la versión 2.3.5 o superior para mitigar la vulnerabilidad de Directory Traversal. Esta actualización corrige la forma en que el plugin maneja las rutas de archivos, previniendo el acceso no autorizado y la posible eliminación de archivos críticos como wp-config.php.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-6379 is a HIGH severity Directory Traversal vulnerability affecting the BeeTeam368 Extensions Pro WordPress plugin, allowing authenticated attackers to access files outside intended directories and potentially take over the site.
You are affected if your WordPress site uses BeeTeam368 Extensions Pro versions 0.0.0 through 2.3.4. Check your plugin versions immediately.
Upgrade the BeeTeam368 Extensions Pro plugin to version 2.3.5 or later to remediate the vulnerability. Consider WAF rules as a temporary mitigation if upgrading is not immediately possible.
There are currently no publicly available exploits or reports of active exploitation campaigns, but the vulnerability is considered HIGH severity and may be targeted.
Refer to the BeeTeam368 Extensions Pro plugin documentation and website for the official advisory and release notes regarding version 2.3.5.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.