<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>WP-Optimize – Cache, Compress Images, Minify &amp; Clean Database to Boost Page Speed &amp; Performance &lt;= 4.5.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/wp-optimize--cache-compress-images-minify--clean-database-to-boost-page-speed--performance--4.5.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/wp-optimize--cache-compress-images-minify--clean-database-to-boost-page-speed--performance--4.5.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>WP-Optimize Plugin Vulnerable to Arbitrary File Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-wp-optimize-file-deletion/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wp-optimize-file-deletion/</guid><description>The WP-Optimize plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation, allowing authenticated attackers with author-level access or higher to delete arbitrary files, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The WP-Optimize – Cache, Compress images, Minify &amp; Clean database to boost page speed &amp; performance plugin, a widely used WordPress plugin, contains a critical vulnerability that allows authenticated attackers with author-level permissions and above to delete arbitrary files on the server. This vulnerability, identified as CVE-2026-7252, stems from insufficient file path validation in the <code>unscheduled_original_file_deletion</code> function within the plugin. The issue affects all versions up to and including 4.5.2. Successful exploitation can lead to complete compromise of the WordPress installation, including remote code execution by deleting critical files such as <code>wp-config.php</code>. The attack is facilitated by the fact that <code>original-file</code> is a publicly accessible meta key.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker obtains author-level or higher access to a WordPress site with the vulnerable WP-Optimize plugin installed.</li>
<li>The attacker identifies the <code>original-file</code> meta key associated with an attachment post.</li>
<li>The attacker modifies the <code>original-file</code> meta key via the Edit Media form or the REST API to point to a sensitive file on the server, such as <code>wp-config.php</code>.</li>
<li>The <code>unscheduled_original_file_deletion</code> function is triggered (likely via a scheduled task or other plugin functionality that utilizes the meta key).</li>
<li>Due to the insufficient file path validation, the plugin attempts to delete the file specified in the modified <code>original-file</code> meta key (e.g., <code>wp-config.php</code>).</li>
<li>The sensitive file is successfully deleted from the server.</li>
<li>The attacker leverages the deleted sensitive file to achieve remote code execution, potentially by exploiting missing configuration or using alternative attack vectors.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to delete arbitrary files on the WordPress server. This can lead to a complete loss of website functionality, data corruption, and potential remote code execution. Deleting configuration files, such as <code>wp-config.php</code>, can allow attackers to gain control of the database and the entire WordPress installation. Given the popularity of the WP-Optimize plugin, a large number of WordPress websites are potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP-Optimize plugin to a version greater than 4.5.2 to patch CVE-2026-7252.</li>
<li>Deploy the Sigma rule &ldquo;WP-Optimize Arbitrary File Deletion Attempt&rdquo; to detect attempts to modify the <code>original-file</code> meta key to point to sensitive files.</li>
<li>Monitor WordPress access logs for suspicious activity related to the Edit Media form and REST API endpoints to detect unauthorized modifications of attachment metadata.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-deletion</category><category>rce</category></item></channel></rss>