๐Ÿ” CVE Alert

CVE-2025-6381

HIGH 8.8

BeeTeam368 Extensions <= 2.3.4 - Authenticated (Subscriber+) Directory Traversal to Arbitrary File Deletion

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

The BeeTeam368 Extensions plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_remove_temp_file() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.

CWE CWE-36
Vendor beeteam368
Product beeteam368 extensions
Published Jun 28, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for beeteam368 beeteam368 extensions

Be the first to know when new high vulnerabilities affecting beeteam368 beeteam368 extensions are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

beeteam368 / BeeTeam368 Extensions
0 โ‰ค 2.3.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/aed40456-43c3-4647-9bce-e7c6139c84cd?source=cve themeforest.net: https://themeforest.net/item/vidmov-video-wordpress-theme/35542187

Credits

Tonn