Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 11 Dec 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:10web:10web_booster:*:*:*:*:*:wordpress:*:* |
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
10web
10web 10web Booster Wordpress Wordpress wordpress |
|
| Vendors & Products |
10web
10web 10web Booster Wordpress Wordpress wordpress |
Mon, 08 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 06 Dec 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The 10Web Booster – Website speed optimization, Cache & Page Speed optimizer plugin for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the get_cache_dir_for_page_from_url() function in all versions up to, and including, 2.32.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary folders on the server, which can easily lead to a loss of data or a denial of service condition. | |
| Title | 10Web Booster <= 2.32.7 - Authenticated (Subscriber+) Arbitrary Folder Deletion via two_clear_page_cache | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:34:03.487Z
Reserved: 2025-11-18T19:31:43.901Z
Link: CVE-2025-13377
Updated: 2025-12-08T21:27:08.604Z
Status : Analyzed
Published: 2025-12-06T07:15:46.830
Modified: 2025-12-11T21:45:39.327
Link: CVE-2025-13377
No data.
OpenCVE Enrichment
Updated: 2026-04-21T01:00:12Z