CVE-2025-7694
Woffice Core <= 5.4.26 - Authenticated (Contributor+) Arbitrary File Deletion
CVSS Score
6.8
EPSS Score
0.0%
EPSS Percentile
0th
The Woffice Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the woffice_file_manager_delete() function in all versions up to, and including, 5.4.26. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
| CWE | CWE-22 |
| Vendor | wofficeio |
| Product | woffice core |
| Published | Aug 2, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for wofficeio woffice core
Be the first to know when new medium vulnerabilities affecting wofficeio woffice core are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
WofficeIO / Woffice Core
0 ≤ 5.4.26
References
Credits
Trương Hữu Phúc (truonghuuphuc)