<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Backup and Restore — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/backup-and-restore/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:23:42 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/backup-and-restore/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Backup and Restore Plugin Arbitrary File Deletion (CVE-2021-47979)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47979-wordpress-file-deletion/</link><pubDate>Sat, 16 May 2026 16:23:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47979-wordpress-file-deletion/</guid><description>WordPress Backup and Restore plugin 1.0.3 contains an arbitrary file deletion vulnerability (CVE-2021-47979) allowing authenticated attackers to delete files by manipulating parameters in AJAX requests to admin-ajax.php.</description><content:encoded><![CDATA[<p>The WordPress Backup and Restore plugin version 1.0.3 is vulnerable to an arbitrary file deletion vulnerability (CVE-2021-47979). This vulnerability allows authenticated attackers, with at least low privileges, to delete arbitrary files on the WordPress server. The attack involves crafting POST requests to the admin-ajax.php endpoint with specifically manipulated <code>file_name</code> and <code>folder_name</code> parameters. Successful exploitation leads to arbitrary file deletion, potentially causing significant data loss and service disruption for the affected WordPress site. This vulnerability was reported on May 16, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the WordPress application with low-level privileges.</li>
<li>The attacker crafts a malicious POST request targeting the <code>admin-ajax.php</code> endpoint.</li>
<li>The POST request includes parameters <code>action</code> set to the vulnerable plugin&rsquo;s AJAX action hook, and <code>file_name</code> and <code>folder_name</code> parameters specifying the target file for deletion.</li>
<li>The WordPress server processes the request without proper validation of the <code>file_name</code> and <code>folder_name</code> parameters.</li>
<li>The plugin&rsquo;s code constructs a file path using the provided parameters.</li>
<li>The plugin&rsquo;s code calls the PHP <code>unlink()</code> function with the constructed file path, attempting to delete the specified file.</li>
<li>If the attacker-controlled path is accessible to the WordPress process, the file is deleted from the server.</li>
<li>The attacker repeats this process to delete multiple files, causing data loss or potentially disrupting the website functionality.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2021-47979 allows an attacker to delete arbitrary files within the WordPress installation directory. This can lead to significant data loss, including critical website files, database backups, and uploaded media. The impact can range from defacement to complete website unavailability, potentially affecting businesses relying on the WordPress platform.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WordPress Backup and Restore plugin to a version that patches CVE-2021-47979 if a patch is available.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2021-47979 Exploitation Attempt via WordPress admin-ajax.php&rdquo; to detect malicious POST requests to <code>admin-ajax.php</code> with suspicious <code>file_name</code> and <code>folder_name</code> parameters.</li>
<li>Implement strict file access controls on the WordPress server to limit the files that the WordPress process can access and delete.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>file-deletion</category><category>cve-2021-47979</category></item></channel></rss>