Description
The WordPress User Extra Fields plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the save_fields() function in all versions up to, and including, 16.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Problem types
CWE-36 Absolute Path Traversal
Product status
* (semver)
Timeline
| 2025-10-30: | Disclosed |
Credits
Tonn
References
www.wordfence.com/...-e2df-4bdb-8ccb-18a96173a55d?source=cve
codecanyon.net/item/user-extra-fields/12949844