{"id":57255,"date":"2025-07-04T19:26:36","date_gmt":"2025-07-04T19:26:36","guid":{"rendered":""},"modified":"2025-09-03T04:05:41","modified_gmt":"2025-09-03T10:05:41","slug":"cve-2025-6379-critical-directory-traversal-vulnerability-in-beeteam368-extensions-pro-plugin-for-wordpress","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-6379-critical-directory-traversal-vulnerability-in-beeteam368-extensions-pro-plugin-for-wordpress\/","title":{"rendered":"<strong>CVE-2025-6379: Critical Directory Traversal Vulnerability in BeeTeam368 Extensions Pro Plugin for WordPress<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The BeeTeam368 Extensions Pro plugin for WordPress has been identified as vulnerable to a severe Directory Traversal exploit. This vulnerability, identified as CVE-2025-6379, affects all versions up to and including 2.3.4. As WordPress is a widely used content management system, the potential impact of this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-4994-critical-csrf-vulnerability-in-gitlab-s-graphql-api-leading-to-arbitrary-graphql-mutations\/\"  data-wpil-monitor-id=\"63727\">vulnerability is extensive and could lead<\/a> to full system compromise or data leakage. This vulnerability is particularly concerning as it could be <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-1411-exploitation-of-unnecessary-privileges-in-ibm-security-verify-directory-container\/\"  data-wpil-monitor-id=\"78099\">exploited by attackers with a low privilege<\/a> level, such as Subscribers, highlighting the importance of immediate mitigation efforts.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-6379<br \/>\nSeverity: High (CVSS: 8.8)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: Subscriber level<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5868-critical-vulnerability-in-rt-thread-leading-to-system-compromise-and-data-leakage\/\"  data-wpil-monitor-id=\"63869\">System compromise<\/a>, potential data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-439109905\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6381-directory-traversal-vulnerability-in-beeteam368-extensions-plugin-for-wordpress\/\"  data-wpil-monitor-id=\"65589\">BeeTeam368 Extensions Pro Plugin<\/a> for WordPress | Up to and including 2.3.4<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The vulnerability resides in the handle_live_fn() function of the BeeTeam368 Extensions Pro <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6755-wordpress-plugin-vulnerability-leads-to-arbitrary-file-deletion\/\"  data-wpil-monitor-id=\"65624\">plugin for WordPress<\/a>. A flaw in this function allows authenticated users to perform actions on files outside of the originally intended directory, a type of attack known as <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52562-directory-traversal-vulnerability-in-performave-convoy-localecontroller\/\"  data-wpil-monitor-id=\"63704\">Directory Traversal<\/a>. This flaw can be exploited by attackers to delete the wp-config.php file, a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49256-critical-php-remote-file-inclusion-vulnerability-in-thembay-sapa\/\"  data-wpil-monitor-id=\"63699\">critical file<\/a> for WordPress site functions. By deleting this file, attackers could potentially take over the website, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5866-critical-vulnerability-in-rt-thread-5-1-0-potentially-leading-to-system-compromise-or-data-leakage\/\"  data-wpil-monitor-id=\"63818\">leading to severe impacts such as data leakage or system compromise<\/a>.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-110624841\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>The following conceptual example demonstrates how an attacker might exploit this vulnerability. This code is a simplified representation and not a working exploit:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/wp-admin\/admin-ajax.php?action=bt_handle_live_fn HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/x-www-form-urlencoded\nfile=..\/..\/..\/..\/..\/wp-config.php&amp;cmd=delete<\/code><\/pre>\n<p>In this example, the attacker attempts to delete the wp-config.php <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-53964-critical-file-manipulation-vulnerability-in-goldendict\/\"  data-wpil-monitor-id=\"67164\">file by manipulating<\/a> the file parameter in the POST request to traverse directories upwards and target the wp-config.php file.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>To mitigate this vulnerability, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4334-critical-privilege-escalation-vulnerability-in-simple-user-registration-plugin-for-wordpress\/\"  data-wpil-monitor-id=\"64923\">users of BeeTeam368 Extensions Pro plugin<\/a> for WordPress should apply the latest vendor patch as soon as possible. As a temporary solution, implementing a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide an additional layer of protection. However, these solutions should not replace the need for patching, as they may not completely prevent exploitation of the vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The BeeTeam368 Extensions Pro plugin for WordPress has been identified as vulnerable to a severe Directory Traversal exploit. This vulnerability, identified as CVE-2025-6379, affects all versions up to and including 2.3.4. As WordPress is a widely used content management system, the potential impact of this vulnerability is extensive and could lead to full system [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[85],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-57255","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-directory-traversal"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/57255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=57255"}],"version-history":[{"count":10,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/57255\/revisions"}],"predecessor-version":[{"id":70472,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/57255\/revisions\/70472"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=57255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=57255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=57255"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=57255"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=57255"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=57255"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=57255"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=57255"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=57255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}