<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4350 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4350/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 03 Apr 2026 08:16:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4350/feed.xml" rel="self" type="application/rss+xml"/><item><title>Perfmatters WordPress Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4350)</title><link>https://feed.craftedsignal.io/briefs/2026-04-perfmatters-file-deletion/</link><pubDate>Fri, 03 Apr 2026 08:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-perfmatters-file-deletion/</guid><description>The Perfmatters plugin for WordPress versions up to 2.5.9.1 is vulnerable to arbitrary file deletion via path traversal, allowing authenticated attackers with minimal privileges to delete sensitive files.</description><content:encoded><![CDATA[<p>The Perfmatters plugin, a popular WordPress performance optimization tool, contains a critical vulnerability (CVE-2026-4350) affecting versions up to and including 2.5.9.1. This flaw enables authenticated attackers with Subscriber-level access, the lowest privilege level in WordPress, to delete arbitrary files on the server. The vulnerability stems from the <code>PMCS::action_handler()</code> method&rsquo;s failure to sanitize the <code>$_GET['delete']</code> parameter. This lack of validation allows for path traversal attacks using sequences like <code>../</code>, enabling attackers to navigate outside the intended storage directory and delete any accessible file. Successful exploitation can lead to the deletion of critical files such as <code>wp-config.php</code>, effectively disabling the website and potentially allowing a full site takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using a vulnerable version (&lt;=2.5.9.1) of the Perfmatters plugin.</li>
<li>Attacker gains Subscriber-level access to the WordPress site. This can be achieved through registration or compromised credentials.</li>
<li>Attacker crafts a malicious HTTP GET request targeting the WordPress site. The request includes the <code>delete</code> parameter with a path traversal payload. For example: <code>?delete=../../../../wp-config.php</code>.</li>
<li>The request is sent to the <code>PMCS::action_handler()</code> method within the Perfmatters plugin.</li>
<li>The <code>PMCS::action_handler()</code> method processes the unsanitized <code>$_GET['delete']</code> parameter.</li>
<li>The plugin concatenates the malicious path with the storage directory.</li>
<li>The <code>unlink()</code> function executes, deleting the file specified by the attacker&rsquo;s path traversal payload.</li>
<li>If the attacker successfully deletes <code>wp-config.php</code>, the WordPress site becomes inaccessible and redirects to the installation wizard, potentially allowing for complete site takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4350 allows attackers to delete arbitrary files on a vulnerable WordPress server. A key target is <code>wp-config.php</code>, which contains sensitive database credentials. Deleting this file forces WordPress into the installation wizard, potentially leading to a full site takeover. The impact ranges from defacement and data loss to complete control of the website, impacting businesses, organizations, and individuals relying on WordPress for their online presence. The ease of exploitation due to the low privilege requirements makes this a high-risk vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Perfmatters plugin to the latest version to patch CVE-2026-4350.</li>
<li>Implement the provided Sigma rule <code>Detect Perfmatters Arbitrary File Deletion Attempt</code> to identify potential exploitation attempts based on <code>cs-uri-query</code> in web server logs.</li>
<li>Consider implementing rate limiting on requests to <code>wp-admin/options.php</code> to mitigate potential brute-force exploitation attempts targeting this vulnerability.</li>
<li>Review web server access logs for unusual patterns in <code>cs-uri-query</code> parameters containing <code>../</code> sequences, as these may indicate path traversal attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4350</category><category>wordpress</category><category>perfmatters</category><category>file-deletion</category><category>path-traversal</category></item></channel></rss>