CVE Alert: CVE-2025-10494 – stylemix – Motors – Car Dealership & Classified Listings Plugin

CVE-2025-10494

HIGHNo exploitation known

The Motors – Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation when deleting profile pictures in all versions up to, and including, 1.4.89. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

CVSS v3.1 (8.1)
Vendor
stylemix
Product
Motors – Car Dealership & Classified Listings Plugin
Versions
* lte 1.4.89
CWE
CWE-73, CWE-73 External Control of File Name or Path
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Published
2025-10-08T03:31:32.827Z
Updated
2025-10-08T03:31:32.827Z

AI Summary Analysis

Risk verdict

High. Authenticated users with Subscriber+ privileges can delete arbitrary files, potentially enabling remote code execution; urgency depends on any external exploitation signals (not provided here).

Why this matters

A successful abuse could compromise a live site, expose data, or allow defender-busting activity and persistence. Realistic attacker goals include taking control of the web server, inserting web shells, or disabling security controls by removing or replacing critical files.

Most likely attack path

Preconditions: authenticated access at Subscriber+ level; network access to the hosting environment; no user interaction required. The flaw stems from inadequate file path validation when deleting profile pictures, enabling deletion of sensitive server files. If a critical file (e.g., a PHP config file) is deleted, an attacker may trigger remote code execution and move laterally from the web layer to deeper systems.

Who is most exposed

Sites hosting this plugin on self-managed WordPress deployments with staff or agency accounts are at risk, especially where file permissions are lax, or where administrators reuse credentials or lack MFA.

Detection ideas

  • Alerts on unexpected deletions in webroot/uploads or profile-related paths.
  • Logs showing deletion actions by Subscriber+ accounts outside normal workflow.
  • Sudden deletions or replacements of config-like PHP files.
  • Post-deletion web requests indicative of payload execution or web shell activity.
  • File integrity monitoring triggering on critical file changes.

Mitigation and prioritisation

  • Patch to the latest version or vendor-recommended release; apply promptly.
  • Enforce least privilege; restrict deletion rights and validate file paths for deletion endpoints.
  • Implement application-layer controls (WAF/mod_security) around file-management endpoints.
  • Enable MFA for all Subscriber+ accounts; monitor for unusual deletion activity.
  • Ensure verified backups and rapid recovery procedures.
  • If KEV is true or EPSS ≥ 0.5, treat as priority 1.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.