Description
The Wptobe-memberships plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the del_img_ajax_call() function in all versions up to, and including, 3.4.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Problem types
CWE-73 External Control of File Name or Path
Product status
*
Timeline
2025-08-22: | Disclosed |
Credits
Aril Aprilio
References
www.wordfence.com/...-33a9-4891-b4ad-9bc6052603cb?source=cve
plugins.trac.wordpress.org/.../bwlms-fields/bwlms-fields.php
plugins.svn.wordpress.org/...k/bwlms-fields/bwlms-fields.php