Home

Description

The Wptobe-memberships plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the del_img_ajax_call() function in all versions up to, and including, 3.4.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PUBLISHED Reserved 2025-08-14 | Published 2025-08-23 | Updated 2025-08-25 | Assigner Wordfence




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Problem types

CWE-73 External Control of File Name or Path

Product status

Default status
unaffected

*
affected

Timeline

2025-08-22:Disclosed

Credits

Aril Aprilio finder

References

www.wordfence.com/...-33a9-4891-b4ad-9bc6052603cb?source=cve

plugins.trac.wordpress.org/.../bwlms-fields/bwlms-fields.php

plugins.svn.wordpress.org/...k/bwlms-fields/bwlms-fields.php

cve.org (CVE-2025-9048)

nvd.nist.gov (CVE-2025-9048)

Download JSON