๐Ÿ” CVE Alert

CVE-2025-6379

HIGH 8.8

BeeTeam368 Extensions Pro <= 2.3.4 - Authenticated (Subscriber+) Directory Traversal to Arbitrary File Deletion

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

The BeeTeam368 Extensions Pro plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_live_fn() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.

CWE CWE-22
Vendor beeteam368
Product beeteam368 extensions pro
Published Jun 28, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for beeteam368 beeteam368 extensions pro

Be the first to know when new high vulnerabilities affecting beeteam368 beeteam368 extensions pro are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

beeteam368 / BeeTeam368 Extensions Pro
0 โ‰ค 2.3.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/26abf509-f0a9-4849-9028-d6c42832158f?source=cve themeforest.net: https://themeforest.net/item/vidmov-video-wordpress-theme/35542187

Credits

Tonn