Description
The atec Debug plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation on the 'debug_path' parameter in all versions up to, and including, 1.2.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Problem types
CWE-36 Absolute Path Traversal
Product status
*
Timeline
2025-08-27: | Vendor Notified |
2025-09-03: | Disclosed |
Credits
Jonas Benjamin Friedli
References
www.wordfence.com/...-e31b-452e-8c15-d44a8be7757b?source=cve
plugins.trac.wordpress.org/...trunk/includes/ATEC/CONFIG.php
plugins.trac.wordpress.org/...d=3342365%40atec-debug%2Ftrunk