Home

Description

The WPFunnels plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wpfnl_delete_log() function in all versions up to, and including, 3.6.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PUBLISHED Reserved 2025-10-20 | Published 2025-11-08 | Updated 2025-11-08 | Assigner Wordfence




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-10-21:Vendor Notified
2025-11-07:Disclosed

Credits

Le Cong Danh finder

References

www.wordfence.com/...-b12a-4a36-9321-bf1479906a5d?source=cve

plugins.trac.wordpress.org/...tings/class-wpfnl-settings.php

plugins.trac.wordpress.org/.../logger/class-wpfnl-logger.php

plugins.trac.wordpress.org/...tings/class-wpfnl-settings.php

cve.org (CVE-2025-12000)

nvd.nist.gov (CVE-2025-12000)

Download JSON