Description
The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to arbitrary file deletion (via renaming) due to insufficient file path validation in the set_user_profile_image function in all versions up to, and including, 6.6.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Published: 2025-10-09
Score: 9.8 Critical
EPSS: 1.6% Low
KEV: No
Impact: Remote File Deletion leading to Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to rename any file on the server by submitting a crafted request to the set_user_profile_image function in the WP Travel Engine – Tour Booking Plugin. The insufficient path validation means the function accepts any relative or absolute path, resulting in arbitrary file deletion when the rename target is an existing file. Deletion of critical configuration files such as wp-config.php can directly lead to remote code execution, so the impact includes loss of confidentiality, integrity, and availability. The weakness maps to CWE‑22: Path Traversal.

Affected Systems

All installations of the WP Travel Engine – Tour Booking Plugin – Tour Operator Software with versions up to and including 6.6.7 are affected. The plugin is used within WordPress sites that host travel booking functionality. No versions newer than 6.6.7 provide a fix as of the last public update.

Risk and Exploitability

The base scoring shows a CVSS score of 9.8, indicating critical severity. The EPSS of 1% signals that while the probability of exploitation is low, the risk is not insignificant due to the high impact. The vulnerability is not listed in the CISA KEV catalog, but its potential for remote code execution makes it a high‑priority issue. An attacker could trigger the deletion by issuing a crafted HTTP request to the plugin’s endpoint; authentication may be required depending on site configuration, but unauthenticated users can often invoke the function to delete files via the WordPress media library workflow. The deletion can be performed without additional privileges once the attacker reaches the image upload process.

Generated by OpenCVE AI on April 20, 2026 at 21:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the plugin to the latest available version, which should include the path validation fix.
  • If an upgrade cannot be performed immediately, restrict or disable the set_user_profile_image functionality for subscriber and lower user roles, or remove the image upload capability entirely from the plugin.
  • Deploy a firewall rule or application layer filter that blocks requests attempting to rename files to absolute or relative paths outside the allowed upload directory.
  • Monitor the web server logs for unusual file rename requests and alert administrators when oversized or suspicious upload attempts occur.

Generated by OpenCVE AI on April 20, 2026 at 21:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 09 Oct 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wptravelengine
Wptravelengine wp Travel Engine
Vendors & Products Wordpress
Wordpress wordpress
Wptravelengine
Wptravelengine wp Travel Engine

Thu, 09 Oct 2025 05:45:00 +0000

Type Values Removed Values Added
Description The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to arbitrary file deletion (via renaming) due to insufficient file path validation in the set_user_profile_image function in all versions up to, and including, 6.6.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Title WP Travel Engine – Tour Booking Plugin – Tour Operator Software <= 6.6.7 - Authenticated (Subscriber+) Arbitrary File Deletion via File Renaming
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
Wptravelengine Wp Travel Engine
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:21:23.789Z

Reserved: 2025-07-12T08:37:47.770Z

Link: CVE-2025-7526

cve-icon Vulnrichment

Updated: 2025-10-09T16:03:05.304Z

cve-icon NVD

Status : Deferred

Published: 2025-10-09T06:15:35.887

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7526

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T21:45:18Z

Weaknesses