On October 11, 2025, a critical security vulnerability, CVE-2025-6439, was disclosed in the WooCommerce Designer Pro plugin for WordPress. The flaw is an unauthenticated path traversal vulnerability with a CVSS 3.1 score of 9.8 (Critical). It allows a remote attacker to delete arbitrary files from the server hosting the WordPress site. This can be leveraged to cause a denial of service, wipe the entire website, or potentially achieve remote code execution (RCE) by deleting the WordPress configuration file and initiating a fresh installation. The vulnerability impacts all plugin versions up to 1.9.26 and is also present in the bundled 'Pricom - Printing Company & Design Services' theme. Immediate action is required from all users of the affected plugin or theme.
CVE-2025-6439CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')wcdpsavecanvasdesignajax AJAX function of the plugin./wp-admin/admin-ajax.php). No authentication is required.../) to navigate outside the intended directory and target any file on the server that the web server process has permissions to delete.Given the popularity of WooCommerce for e-commerce sites, a large number of online stores could be at risk if they use this specific design plugin.
As of the disclosure, there were no reports of active exploitation in the wild. However, due to the critical severity and the ease of exploitation (requiring only a single unauthenticated request), it is highly likely that threat actors will begin scanning for and exploiting vulnerable sites imminently. A public proof-of-concept is likely to appear quickly.
Successful exploitation of CVE-2025-6439 can have devastating consequences:
wp-config.php file. This action forces WordPress to trigger its installation process. The attacker can then go through the installation steps, connect the site to a database they control, and gain full administrative access, allowing them to upload malicious plugins or themes to achieve RCE.| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| url_pattern | /wp-admin/admin-ajax.php |
The endpoint for WordPress AJAX calls. | Monitor POST requests to this endpoint containing the wcdpsavecanvasdesignajax action and path traversal characters (../). |
high |
| command_line_pattern | action=wcdpsavecanvasdesignajax |
The specific AJAX action that is vulnerable. | WAF logs, web server access logs. | high |
| file_path | wp-config.php |
Deletion of this file is a key indicator of an RCE attempt via this vulnerability. | File Integrity Monitoring (FIM) alerts. | high |
admin-ajax.php containing the wcdpsavecanvasdesignajax action and path traversal sequences. This is a form of D3FEND Inbound Traffic Filtering.wp-config.php. An alert on the deletion of this file should be treated as a critical security incident.M1051 - Update Software): The primary remediation is to update the WooCommerce Designer Pro plugin to a patched version. Users should check the plugin's official repository or vendor site for the latest secure version.wp-config.php. If it is missing, immediately restore the site from a known-good backup and change all database, FTP, and WordPress admin credentials.Immediately update the vulnerable plugin to the latest patched version.
Mapped D3FEND Techniques:
Use a Web Application Firewall (WAF) to block requests containing path traversal patterns targeting the vulnerable AJAX action.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats