Overview
The CVE-2025-4603 vulnerability exposes a significant flaw in the eMagicOne Store Manager for WooCommerce plugin for WordPress, making it susceptible to arbitrary file deletion. This vulnerability affects all versions up to, and including, 1.2.5. The risk is significant – potentially enabling unauthenticated attackers to delete arbitrary files on a server, which can lead to remote code execution in certain scenarios. This is a particularly critical issue because of the widespread use of the WooCommerce platform for e-commerce websites, which store sensitive customer data and transactional information.
Vulnerability Summary
CVE ID: CVE-2025-4603
Severity: Critical (9.1 CVSS score)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise; data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
eMagicOne Store Manager for WooCommerce | Up to, and including, 1.2.5
How the Exploit Works
The vulnerability lies in the insufficient file path validation in the delete_file() function in the plugin. As the plugin does not adequately validate the file paths, unauthenticated attackers can manipulate the function to delete any files on the server. This can be devastating if the attacker deletes vital system files, such as wp-config.php which leads to remote code execution.
Conceptual Example Code
To understand how this vulnerability can be exploited, consider the following conceptual HTTP request:
POST /delete_file HTTP/1.1
Host: victim-site.com
Content-Type: application/json
{ "filename": "/path/to/important/system/file" }
In this hypothetical example, an attacker sends a POST request to the delete_file endpoint of the vulnerable site, instructing the server to delete an important system file. If the server does not adequately validate this request and the file path it contains, it will proceed to delete the file, potentially causing significant damage to the server’s operation or even allowing the attacker to execute remote code.
Mitigation
To protect against this vulnerability, users are advised to apply the vendor patch as soon as it is available. In the meantime, implementing a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation. It is also strongly recommended to change any default passwords and always use strong, unique passwords for every user account.