<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-5809 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5809/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 11 Apr 2026 08:16:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5809/feed.xml" rel="self" type="application/rss+xml"/><item><title>wpForo Forum Plugin Arbitrary File Deletion Vulnerability (CVE-2026-5809)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wpforo-file-deletion/</link><pubDate>Sat, 11 Apr 2026 08:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wpforo-file-deletion/</guid><description>The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion due to a logic flaw that allows authenticated users to delete arbitrary files writable by the PHP process by manipulating post metadata.</description><content:encoded><![CDATA[<p>The wpForo Forum plugin, a popular WordPress plugin, is susceptible to an arbitrary file deletion vulnerability (CVE-2026-5809) affecting versions up to and including 3.0.2. The vulnerability stems from insufficient validation of user-supplied data within the <code>topic_add()</code> and <code>topic_edit()</code> action handlers. Specifically, the plugin improperly handles array values in the <code>$_REQUEST</code> data, storing them as postmeta without proper filtering. An authenticated attacker (subscriber-level or higher) can exploit this by injecting a malicious file path into the <code>data[body][fileurl]</code> parameter. This injected path is subsequently used in a file deletion function without adequate sanitization, leading to potential deletion of critical system files. This vulnerability allows attackers to potentially cripple the WordPress installation or gain further access to the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with at least subscriber-level privileges.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>topic_add()</code> or <code>topic_edit()</code> action handler.</li>
<li>Within the request, the attacker includes the <code>data[body][fileurl]</code> parameter containing the path to the file they wish to delete (e.g., <code>/var/www/html/wp-config.php</code>).</li>
<li>The wpForo plugin stores the attacker-supplied <code>fileurl</code> value as postmeta associated with the forum topic without proper validation.</li>
<li>The attacker crafts another request, this time including the <code>wpftcf_delete[]=body</code> parameter, targeting the <code>topic_edit</code> action.</li>
<li>The <code>add_file()</code> method retrieves the poisoned <code>fileurl</code> from the stored postmeta record.</li>
<li>The plugin attempts to sanitize the path using <code>wpforo_fix_upload_dir()</code>, but this function only modifies paths within the legitimate wpForo upload directory, leaving other paths untouched.</li>
<li>The plugin calls <code>wp_delete_file()</code> on the unsanitized path, resulting in the deletion of the targeted file if the PHP process has write permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an authenticated attacker to delete arbitrary files on the server, provided the PHP process has the necessary write permissions. This can lead to a denial of service by deleting core WordPress files or configuration files such as <code>wp-config.php</code>. The CVSS v3.1 base score for this vulnerability is 7.1, indicating a high severity. This could lead to complete compromise of the WordPress installation and potential further exploitation of the server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the wpForo Forum plugin to a version higher than 3.0.2 to patch CVE-2026-5809.</li>
<li>Deploy the Sigma rule &ldquo;Detect wpForo Arbitrary File Deletion Attempt&rdquo; to your SIEM to detect potential exploitation attempts by monitoring HTTP requests to WordPress.</li>
<li>Implement stricter file permission controls to limit the PHP process&rsquo;s write access to only necessary directories and files.</li>
<li>Monitor web server logs for suspicious POST requests containing the <code>wpftcf_delete</code> parameter, as highlighted in the Attack Chain.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-deletion</category><category>plugin</category><category>CVE-2026-5809</category></item></channel></rss>