Skip to content
Threat Feed

Tag

File Deletion

14 briefs RSS
high advisory

BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion

CVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.

BuddyPress Xprofile Custom Fields Type rce file-deletion wordpress
2r 1t 1c
high advisory

OpenClaw Arbitrary Directory Deletion Vulnerability

OpenClaw before 2026.4.2 is vulnerable to arbitrary directory deletion in mirror mode, enabling attackers to delete remote directories by manipulating remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values.

OpenClaw cve-2026-41383 directory-traversal file-deletion
2r 1t 1c
high advisory

Hermes WebUI Arbitrary File Deletion Vulnerability (CVE-2026-6832)

Hermes WebUI is vulnerable to arbitrary file deletion via path traversal in the /api/session/delete endpoint due to insufficient validation of the session_id parameter, allowing authenticated attackers to delete writable JSON files on the host system.

cve-2026-6832 path-traversal file-deletion webui
2r 1t 1c
critical advisory

Everest Forms Plugin Arbitrary File Read and Deletion Vulnerability

The Everest Forms plugin for WordPress is vulnerable to arbitrary file read and deletion, allowing unauthenticated attackers to access sensitive data or cause denial of service by manipulating the 'old_files' parameter in versions up to 3.4.4.

wordpress plugin file-read file-deletion cve-2026-5478
2r 3t 1c
high advisory

ThreatSonar Anti-Ransomware Arbitrary File Deletion Vulnerability

TeamT5's ThreatSonar Anti-Ransomware is vulnerable to arbitrary file deletion via path traversal, allowing authenticated remote attackers with web access to delete arbitrary files on the system.

vulnerability file-deletion path-traversal
2r 2t 1c
critical advisory

WP Customer Area Plugin Arbitrary File Read and Deletion Vulnerability

The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation, allowing authenticated attackers to read sensitive files or delete critical files leading to potential remote code execution.

wordpress plugin file-read file-deletion rce
2r 1t 1c
high advisory

Chamilo LMS Path Traversal Vulnerability (CVE-2026-31939)

A path traversal vulnerability (CVE-2026-31939) in Chamilo LMS versions prior to 1.11.38 allows authenticated attackers to delete arbitrary files via unsanitized user input in the 'test' parameter of savescores.php.

path-traversal file-deletion chamilo-lms
2r 1t 1c 1i
critical advisory

wpForo Forum Plugin Arbitrary File Deletion Vulnerability (CVE-2026-5809)

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion due to a logic flaw that allows authenticated users to delete arbitrary files writable by the PHP process by manipulating post metadata.

wordpress file-deletion plugin CVE-2026-5809
2r 1t 1c
critical advisory

Goshs File-Based ACL Authorization Bypass Vulnerability

Goshs is vulnerable to an authorization bypass (CVE-2026-40189) due to inconsistent enforcement of .goshs ACLs on state-changing routes, allowing an unauthenticated attacker to manipulate files within protected directories and bypass authentication barriers.

authorization bypass acl file upload file deletion CVE-2026-40189
3r 4t 4i
critical advisory

goshs Unauthenticated Arbitrary File Deletion via Path Traversal

The goshs application is vulnerable to unauthenticated path traversal (CVE-2026-35471) due to a missing return statement in the `deleteFile()` function, allowing attackers to delete arbitrary files and directories using a crafted GET request.

path-traversal file-deletion goshs
2r 1t
critical advisory

Perfmatters WordPress Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4350)

The Perfmatters plugin for WordPress versions up to 2.5.9.1 is vulnerable to arbitrary file deletion via path traversal, allowing authenticated attackers with minimal privileges to delete sensitive files.

cve-2026-4350 wordpress perfmatters file-deletion path-traversal
2r 1t 1c
high advisory

Endian Firewall Arbitrary File Deletion via Path Traversal (CVE-2026-34790)

Endian Firewall versions 3.3.25 and prior allow authenticated users to delete arbitrary files due to a path traversal vulnerability in the `remove ARCHIVE` parameter of the `/cgi-bin/backup.cgi` script, leading to unauthorized file system modification.

cve path-traversal file-deletion web-application
2r 1t 1c 1i
medium advisory

WebServer Access Logs Deleted

Detection of web server access log deletion across Windows, Linux, and macOS systems indicates potential defense evasion and destruction of forensic evidence by threat actors.

defense-evasion indicator-removal file-deletion
2r 1t
critical advisory

WP Job Portal Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4758)

The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation, allowing authenticated attackers with subscriber-level access or higher to delete arbitrary files, potentially leading to remote code execution.

cve wordpress file-deletion remote-code-execution
2r 3t