<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File-Deletion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file-deletion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 20:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file-deletion/feed.xml" rel="self" type="application/rss+xml"/><item><title>BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion</title><link>https://feed.craftedsignal.io/briefs/2026-04-buddypress-rce/</link><pubDate>Wed, 29 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-buddypress-rce/</guid><description>CVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.</description><content:encoded><![CDATA[<p>BuddyPress Xprofile Custom Fields Type 2.6.3 is vulnerable to a remote code execution vulnerability, identified as CVE-2018-25308. This flaw enables authenticated users to execute arbitrary code on the server by deleting arbitrary files. The attack involves manipulating unescaped POST parameters, specifically <code>field_hiddenfile</code> and <code>field_deleteimg</code>, during profile editing actions. Successful exploitation allows attackers to unlink files from the server, potentially disrupting services or gaining unauthorized access. This vulnerability was published on 2026-04-29 and poses a significant threat to BuddyPress installations that have not applied the necessary patches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to a BuddyPress site running the vulnerable Xprofile Custom Fields Type 2.6.3 plugin.</li>
<li>The attacker navigates to their profile editing page.</li>
<li>The attacker crafts a malicious HTTP POST request to the profile update endpoint.</li>
<li>Within the POST request, the <code>field_hiddenfile</code> and <code>field_deleteimg</code> parameters are manipulated to point to arbitrary files on the server.</li>
<li>The server-side script processes the crafted POST request without proper sanitization or validation of the file paths.</li>
<li>The <code>unlink()</code> function or an equivalent file deletion function is called with the attacker-controlled file paths.</li>
<li>The targeted files are deleted from the server file system.</li>
<li>The attacker can potentially delete critical system files or web application files, leading to remote code execution or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-25308 allows authenticated attackers to delete arbitrary files on the server. This can lead to a denial-of-service condition if critical system files are removed. The vulnerability can also potentially lead to remote code execution if the attacker is able to delete and replace executable files or inject malicious code into configuration files. While the number of victims is unknown, all BuddyPress installations using the vulnerable plugin are susceptible.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates for BuddyPress Xprofile Custom Fields Type to address CVE-2018-25308.</li>
<li>Implement input validation and sanitization on the server-side to prevent manipulation of file paths in POST parameters.</li>
<li>Monitor web server logs for suspicious POST requests targeting the profile update endpoint with unusual <code>field_hiddenfile</code> and <code>field_deleteimg</code> parameter values (reference the attack chain).</li>
<li>Deploy the Sigma rule provided to detect exploitation attempts based on the manipulation of specific POST parameters (reference the Sigma rule).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>file-deletion</category><category>wordpress</category></item><item><title>OpenClaw Arbitrary Directory Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-directory-deletion/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-directory-deletion/</guid><description>OpenClaw before 2026.4.2 is vulnerable to arbitrary directory deletion in mirror mode, enabling attackers to delete remote directories by manipulating remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values.</description><content:encoded><![CDATA[<p>OpenClaw before version 2026.4.2 is susceptible to an arbitrary directory deletion vulnerability (CVE-2026-41383) when operating in mirror mode. An attacker with control over the OpenShell configuration paths, specifically <code>remoteWorkspaceDir</code> and <code>remoteAgentWorkspaceDir</code>, can trigger the deletion of unintended remote directory contents. This is achieved by manipulating these configuration values to point to sensitive directories. The subsequent mirror sync operation replaces the deleted contents with data from the attacker&rsquo;s workspace, leading to data loss and potential system compromise. This vulnerability allows an attacker to potentially wipe out important data on the remote end.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains access to the OpenClaw configuration.</li>
<li>The attacker modifies the <code>remoteWorkspaceDir</code> and/or <code>remoteAgentWorkspaceDir</code> configuration values to point to a target directory they wish to delete.</li>
<li>The attacker initiates a mirror sync operation.</li>
<li>OpenClaw, using the attacker-controlled path, connects to the remote system.</li>
<li>OpenClaw deletes the contents of the directory specified by the modified <code>remoteWorkspaceDir</code> or <code>remoteAgentWorkspaceDir</code>.</li>
<li>OpenClaw uploads the contents of the attacker&rsquo;s local workspace to the now-empty remote directory, effectively replacing the original data.</li>
<li>The targeted remote directory now contains the attacker&rsquo;s data instead of the original contents.</li>
<li>The attacker achieves arbitrary directory deletion and data replacement, potentially causing significant disruption and data loss.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to arbitrary deletion of files and directories on the remote system where OpenClaw is used in mirror mode. The impact includes potential data loss, service disruption, and the replacement of legitimate data with attacker-controlled content. Given the CVSS v3.1 score of 8.1, this vulnerability is considered high severity due to the potential for significant data integrity and availability impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.4.2 or later to remediate CVE-2026-41383.</li>
<li>Monitor OpenClaw configuration files for unauthorized modifications to <code>remoteWorkspaceDir</code> and <code>remoteAgentWorkspaceDir</code> using a file integrity monitoring system.</li>
<li>Implement strict access controls to OpenClaw configuration files to prevent unauthorized modification of these settings.</li>
<li>Deploy the Sigma rule to detect suspicious process execution related to modification of openclaw configuration files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-41383</category><category>directory-traversal</category><category>file-deletion</category><category>openclaw</category></item><item><title>Hermes WebUI Arbitrary File Deletion Vulnerability (CVE-2026-6832)</title><link>https://feed.craftedsignal.io/briefs/2026-04-hermes-file-deletion/</link><pubDate>Wed, 22 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-hermes-file-deletion/</guid><description>Hermes WebUI is vulnerable to arbitrary file deletion via path traversal in the /api/session/delete endpoint due to insufficient validation of the session_id parameter, allowing authenticated attackers to delete writable JSON files on the host system.</description><content:encoded><![CDATA[<p>Hermes WebUI, a web-based user interface, contains an arbitrary file deletion vulnerability, tracked as CVE-2026-6832. The vulnerability resides in the <code>/api/session/delete</code> endpoint. An authenticated attacker can exploit this flaw by supplying a crafted <code>session_id</code> parameter containing an absolute path or path traversal sequences. This allows the attacker to bypass the intended <code>SESSION_DIR</code> boundary and delete arbitrary files on the server, provided the attacker has write access to those files. Versions prior to the patched version are affected. Successful exploitation leads to information integrity issues and potential denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to Hermes WebUI using valid credentials.</li>
<li>Attacker crafts a malicious HTTP POST request to the <code>/api/session/delete</code> endpoint.</li>
<li>The request includes a <code>session_id</code> parameter with a path traversal payload (e.g., <code>../../../../etc/passwd</code>) or an absolute path to a target file.</li>
<li>The Hermes WebUI application fails to properly validate the <code>session_id</code> parameter.</li>
<li>The application constructs a file path using the unvalidated <code>session_id</code>, allowing it to escape the intended <code>SESSION_DIR</code>.</li>
<li>The application attempts to delete the file specified by the attacker-controlled path.</li>
<li>If the attacker has sufficient privileges, the target file is successfully deleted from the file system.</li>
<li>The deletion of critical system or application files leads to a denial-of-service condition or other system instability.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6832 allows authenticated attackers to delete arbitrary files on the system running Hermes WebUI. This can lead to data loss, application malfunction, or even complete system compromise if critical system files are deleted. The vulnerability affects all deployments of Hermes WebUI prior to the patched version, potentially impacting numerous organizations using the vulnerable software. While the exact number of victims is unknown, the severity of the vulnerability is high due to the potential for significant damage and disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Hermes WebUI to version v0.50.132 or later, where the vulnerability is patched, as referenced in the advisory.</li>
<li>Implement strict input validation on the <code>session_id</code> parameter in the <code>/api/session/delete</code> endpoint to prevent path traversal attacks.</li>
<li>Deploy the provided Sigma rule to detect malicious requests to the <code>/api/session/delete</code> endpoint containing path traversal sequences.</li>
<li>Monitor web server logs for HTTP requests to <code>/api/session/delete</code> with suspicious <code>session_id</code> values.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6832</category><category>path-traversal</category><category>file-deletion</category><category>webui</category></item><item><title>Everest Forms Plugin Arbitrary File Read and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-08-everest-forms-rfi-rce/</link><pubDate>Mon, 20 Apr 2026 20:35:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-08-everest-forms-rfi-rce/</guid><description>The Everest Forms plugin for WordPress is vulnerable to arbitrary file read and deletion, allowing unauthenticated attackers to access sensitive data or cause denial of service by manipulating the 'old_files' parameter in versions up to 3.4.4.</description><content:encoded><![CDATA[<p>The Everest Forms plugin for WordPress, versions 3.4.4 and earlier, contains an arbitrary file read and deletion vulnerability (CVE-2026-5478). This flaw stems from the plugin&rsquo;s improper handling of the <code>old_files</code> parameter within form submissions. Specifically, the plugin trusts attacker-controlled data as legitimate server-side upload state and insecurely converts URLs into local filesystem paths without adequate sanitization. This lack of input validation enables unauthenticated attackers to inject path traversal sequences, leading to the disclosure of sensitive files like <code>wp-config.php</code>, which contains database credentials and authentication salts. Furthermore, the flawed path resolution is utilized in a post-email cleanup routine, resulting in arbitrary file deletion via the <code>unlink()</code> function, potentially causing a denial-of-service condition. Successful exploitation requires a form with a file-upload or image-upload field and the &ldquo;store entry information&rdquo; feature disabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker crafts a malicious HTTP POST request to a WordPress page containing an Everest Forms form with a file upload field.</li>
<li>The attacker includes the <code>old_files</code> parameter in the POST data, injecting a path traversal payload (e.g., <code>../../../../wp-config.php</code>) into its value.</li>
<li>The WordPress application processes the form submission, and the Everest Forms plugin extracts the <code>old_files</code> parameter.</li>
<li>The plugin&rsquo;s flawed logic converts the attacker-supplied URL into a local file system path using regex-based string replacement without canonicalization or directory boundary enforcement.</li>
<li>The plugin attaches the resolved file (e.g., <code>/var/www/wordpress/../../../../wp-config.php</code>) to the notification email.</li>
<li>After sending the notification email, the post-email cleanup routine utilizes the same flawed path resolution to determine the file to delete.</li>
<li>The <code>unlink()</code> function is called on the resolved path, leading to the deletion of the targeted file (e.g., <code>wp-config.php</code>).</li>
<li>The attacker gains access to sensitive information (database credentials, salts) or causes a denial of service by deleting critical system files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5478 allows unauthenticated attackers to read arbitrary files on the WordPress server, potentially exposing sensitive information like database credentials and authentication salts stored in <code>wp-config.php</code>. This could lead to full site compromise, including data theft, defacement, or further malicious activities. Furthermore, the ability to delete arbitrary files enables attackers to cause a denial-of-service condition by removing critical system or application files. The impact is significant as it affects all versions of the Everest Forms plugin up to and including 3.4.4.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Everest Forms plugin to a version higher than 3.4.4 to patch CVE-2026-5478.</li>
<li>Deploy the Sigma rule &ldquo;Detect Everest Forms Arbitrary File Read Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Enable web server logging to capture HTTP POST requests, which are crucial for detecting path traversal attempts (cs-uri-query, cs-method in webserver logs).</li>
<li>Monitor file deletion events on the WordPress server, especially those initiated by the web server user, using a file integrity monitoring (FIM) solution (file_event logs).</li>
<li>Implement input validation and sanitization for all user-supplied data, especially file paths, to prevent path traversal vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-read</category><category>file-deletion</category><category>cve-2026-5478</category></item><item><title>ThreatSonar Anti-Ransomware Arbitrary File Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-threatsonar-file-deletion/</link><pubDate>Mon, 20 Apr 2026 08:16:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-threatsonar-file-deletion/</guid><description>TeamT5's ThreatSonar Anti-Ransomware is vulnerable to arbitrary file deletion via path traversal, allowing authenticated remote attackers with web access to delete arbitrary files on the system.</description><content:encoded><![CDATA[<p>CVE-2026-5966 describes an arbitrary file deletion vulnerability in TeamT5&rsquo;s ThreatSonar Anti-Ransomware. The vulnerability allows authenticated remote attackers with web access to exploit a path traversal flaw. This means that an attacker who already has valid credentials to access the web interface of ThreatSonar Anti-Ransomware can craft malicious requests to delete files that the application user has access to, regardless of their intended purpose or location. The CVSS v3.1 score is 8.1, indicating a high severity. The vulnerable software is ThreatSonar Anti-Ransomware from TeamT5.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials to the ThreatSonar Anti-Ransomware web interface, likely through credential stuffing or phishing.</li>
<li>The attacker authenticates to the ThreatSonar Anti-Ransomware web application.</li>
<li>The attacker identifies an endpoint within the web application that handles file operations (e.g., backup, restore, quarantine).</li>
<li>The attacker crafts a malicious HTTP request to this endpoint containing a path traversal payload in a filename or filepath parameter (e.g., <code>../../../../windows/system32/drivers/etc/hosts</code>).</li>
<li>The web application processes the request without proper sanitization or validation of the file path.</li>
<li>The application attempts to delete the file specified by the attacker-controlled path.</li>
<li>If the application user has sufficient privileges, the arbitrary file is deleted from the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows authenticated attackers to delete arbitrary files on the system where ThreatSonar Anti-Ransomware is installed. This could lead to denial of service by deleting critical system files, data loss by deleting important data files, or potentially escalate privileges by deleting files used in privilege escalation techniques.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to the latest version of ThreatSonar Anti-Ransomware as provided by TeamT5 to address CVE-2026-5966.</li>
<li>Implement input validation and sanitization on all file path parameters within the ThreatSonar Anti-Ransomware web application to prevent path traversal attacks.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., <code>../</code>, <code>..\\</code>) in file-related parameters to detect potential exploitation attempts. Deploy the Sigma rule for webserver logs.</li>
<li>Implement principle of least privilege and regularly audit user permissions in ThreatSonar Anti-Ransomware.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>file-deletion</category><category>path-traversal</category></item><item><title>WP Customer Area Plugin Arbitrary File Read and Deletion Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-wp-customer-area-file-read-delete/</link><pubDate>Fri, 17 Apr 2026 17:17:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wp-customer-area-file-read-delete/</guid><description>The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation, allowing authenticated attackers to read sensitive files or delete critical files leading to potential remote code execution.</description><content:encoded><![CDATA[<p>The WP Customer Area plugin, a popular WordPress plugin, is susceptible to an arbitrary file read and deletion vulnerability. This flaw, identified as CVE-2026-3464, resides within the &lsquo;ajax_attach_file&rsquo; function and stems from inadequate file path validation. All versions of the plugin up to and including 8.3.4 are affected. The vulnerability enables authenticated attackers with minimal privileges (e.g., Subscriber), granted access by an administrator, to read arbitrary files on the server, potentially exposing sensitive data. Attackers can also delete arbitrary files, which, in certain cases (such as deleting <code>wp-config.php</code>), can pave the way for remote code execution. This vulnerability poses a significant risk to WordPress websites utilizing the WP Customer Area plugin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to a WordPress site with the WP Customer Area plugin enabled, with privileges granted by an administrator (e.g., as a Subscriber).</li>
<li>The attacker crafts a malicious HTTP request targeting the &lsquo;ajax_attach_file&rsquo; function.</li>
<li>The crafted request includes a manipulated file path, bypassing input validation.</li>
<li>The plugin, failing to properly sanitize the file path, attempts to read or delete the file specified in the malicious request.</li>
<li>If reading, the contents of the targeted file are returned to the attacker in the HTTP response.</li>
<li>If deleting, the targeted file is removed from the server.</li>
<li>If the attacker targets a sensitive file, such as <code>wp-config.php</code>, and successfully deletes it, the WordPress installation becomes unstable and potentially allows for re-installation and control by the attacker.</li>
<li>The attacker exploits the instability to achieve remote code execution, potentially installing a web shell or other malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-3464) allows attackers to read sensitive files, potentially including database credentials, API keys, and other confidential information. Moreover, the ability to delete arbitrary files can lead to denial-of-service conditions or, more critically, remote code execution. The number of affected websites is potentially large, given the popularity of the WP Customer Area plugin. A successful attack can result in complete compromise of the WordPress website and its underlying server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the WP Customer Area plugin to a version greater than 8.3.4 to patch CVE-2026-3464.</li>
<li>Monitor web server logs for requests containing suspicious file paths targeting the &lsquo;ajax_attach_file&rsquo; function (see Sigma rule below).</li>
<li>Implement stricter file path validation on the web server to prevent arbitrary file access.</li>
<li>Apply the provided Sigma rules to your SIEM to detect and alert on malicious attempts to exploit this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>file-read</category><category>file-deletion</category><category>rce</category></item><item><title>Chamilo LMS Path Traversal Vulnerability (CVE-2026-31939)</title><link>https://feed.craftedsignal.io/briefs/2026-04-chamilo-path-trav/</link><pubDate>Sat, 11 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-chamilo-path-trav/</guid><description>A path traversal vulnerability (CVE-2026-31939) in Chamilo LMS versions prior to 1.11.38 allows authenticated attackers to delete arbitrary files via unsanitized user input in the 'test' parameter of savescores.php.</description><content:encoded><![CDATA[<p>Chamilo LMS, a learning management system, is vulnerable to a path traversal vulnerability (CVE-2026-31939) affecting versions prior to 1.11.38. This vulnerability resides in the <code>main/exercise/savescores.php</code> script. The vulnerability arises because the application directly concatenates user-supplied input from the <code>$_REQUEST['test']</code> parameter into a filesystem path without proper sanitization, canonicalization, or traversal checks. This allows an attacker to manipulate the path and potentially delete arbitrary files on the server. Successful exploitation requires an authenticated user with access to the vulnerable functionality. Organizations using affected versions of Chamilo LMS are at risk of data loss and potential system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user accesses the <code>main/exercise/savescores.php</code> script within the Chamilo LMS application.</li>
<li>The application retrieves the value of the <code>test</code> parameter from the <code>$_REQUEST</code> array.</li>
<li>The application concatenates this user-supplied value directly into a file system path without proper sanitization or validation.</li>
<li>The application then attempts to delete the file specified by the constructed path using a function such as <code>unlink()</code>.</li>
<li>An attacker crafts a malicious <code>test</code> parameter containing path traversal sequences (e.g., <code>../../</code>) to navigate outside the intended directory.</li>
<li>The application, without proper checks, uses the manipulated path to delete a file outside of the designated exercise directory.</li>
<li>The attacker successfully deletes arbitrary files on the server, potentially including sensitive configuration files or other critical data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-31939 allows an attacker to delete arbitrary files on the Chamilo LMS server. This can lead to data loss, system instability, and potential compromise of the entire system. The CVSS v3.1 score of 8.3 (HIGH) reflects the potential for significant impact, with confidentiality, integrity, and availability all being affected. The number of victims depends on the deployment size and user base of the affected Chamilo LMS instances.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Chamilo LMS to version 1.11.38 or later to patch CVE-2026-31939, as indicated in the advisory <a href="https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.38">https://github.com/chamilo/chamilo-lms/releases/tag/v1.11.38</a>.</li>
<li>Implement input validation and sanitization on all user-supplied input, especially the <code>test</code> parameter in <code>main/exercise/savescores.php</code>, to prevent path traversal attacks.</li>
<li>Monitor web server logs for suspicious requests to <code>main/exercise/savescores.php</code> containing path traversal sequences (e.g., <code>../</code>, <code>..\\</code>), using the provided Sigma rule as a guide.</li>
<li>Implement file system access controls to limit the permissions of the web server process to only the necessary directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-deletion</category><category>chamilo-lms</category></item><item><title>wpForo Forum Plugin Arbitrary File Deletion Vulnerability (CVE-2026-5809)</title><link>https://feed.craftedsignal.io/briefs/2026-04-wpforo-file-deletion/</link><pubDate>Sat, 11 Apr 2026 08:16:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-wpforo-file-deletion/</guid><description>The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion due to a logic flaw that allows authenticated users to delete arbitrary files writable by the PHP process by manipulating post metadata.</description><content:encoded><![CDATA[<p>The wpForo Forum plugin, a popular WordPress plugin, is susceptible to an arbitrary file deletion vulnerability (CVE-2026-5809) affecting versions up to and including 3.0.2. The vulnerability stems from insufficient validation of user-supplied data within the <code>topic_add()</code> and <code>topic_edit()</code> action handlers. Specifically, the plugin improperly handles array values in the <code>$_REQUEST</code> data, storing them as postmeta without proper filtering. An authenticated attacker (subscriber-level or higher) can exploit this by injecting a malicious file path into the <code>data[body][fileurl]</code> parameter. This injected path is subsequently used in a file deletion function without adequate sanitization, leading to potential deletion of critical system files. This vulnerability allows attackers to potentially cripple the WordPress installation or gain further access to the server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the WordPress site with at least subscriber-level privileges.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>topic_add()</code> or <code>topic_edit()</code> action handler.</li>
<li>Within the request, the attacker includes the <code>data[body][fileurl]</code> parameter containing the path to the file they wish to delete (e.g., <code>/var/www/html/wp-config.php</code>).</li>
<li>The wpForo plugin stores the attacker-supplied <code>fileurl</code> value as postmeta associated with the forum topic without proper validation.</li>
<li>The attacker crafts another request, this time including the <code>wpftcf_delete[]=body</code> parameter, targeting the <code>topic_edit</code> action.</li>
<li>The <code>add_file()</code> method retrieves the poisoned <code>fileurl</code> from the stored postmeta record.</li>
<li>The plugin attempts to sanitize the path using <code>wpforo_fix_upload_dir()</code>, but this function only modifies paths within the legitimate wpForo upload directory, leaving other paths untouched.</li>
<li>The plugin calls <code>wp_delete_file()</code> on the unsanitized path, resulting in the deletion of the targeted file if the PHP process has write permissions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an authenticated attacker to delete arbitrary files on the server, provided the PHP process has the necessary write permissions. This can lead to a denial of service by deleting core WordPress files or configuration files such as <code>wp-config.php</code>. The CVSS v3.1 base score for this vulnerability is 7.1, indicating a high severity. This could lead to complete compromise of the WordPress installation and potential further exploitation of the server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the wpForo Forum plugin to a version higher than 3.0.2 to patch CVE-2026-5809.</li>
<li>Deploy the Sigma rule &ldquo;Detect wpForo Arbitrary File Deletion Attempt&rdquo; to your SIEM to detect potential exploitation attempts by monitoring HTTP requests to WordPress.</li>
<li>Implement stricter file permission controls to limit the PHP process&rsquo;s write access to only necessary directories and files.</li>
<li>Monitor web server logs for suspicious POST requests containing the <code>wpftcf_delete</code> parameter, as highlighted in the Attack Chain.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>wordpress</category><category>file-deletion</category><category>plugin</category><category>CVE-2026-5809</category></item><item><title>Goshs File-Based ACL Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-goshs-acl-bypass/</link><pubDate>Fri, 10 Apr 2026 20:02:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-goshs-acl-bypass/</guid><description>Goshs is vulnerable to an authorization bypass (CVE-2026-40189) due to inconsistent enforcement of .goshs ACLs on state-changing routes, allowing an unauthenticated attacker to manipulate files within protected directories and bypass authentication barriers.</description><content:encoded><![CDATA[<p>The Goshs web server is susceptible to a critical authorization bypass (CVE-2026-40189) affecting versions up to and including 1.1.4 and v2.0.0-beta.3. The vulnerability stems from inconsistent enforcement of file-based ACLs defined by <code>.goshs</code> files. While the application correctly enforces authorization for reading and listing files, state-changing routes such as PUT, POST /upload, ?mkdir, and ?delete do not perform the same authorization checks. This allows unauthenticated attackers to upload, create, and delete files within directories that should be protected by authentication. The most severe impact arises from the ability to delete the <code>.goshs</code> file itself, thereby removing the authentication requirement and exposing previously protected content. This vulnerability undermines the intended security mechanisms of Goshs, posing a significant risk to data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Goshs instance utilizing <code>.goshs</code> files for access control.</li>
<li>The attacker sends an unauthenticated PUT request to upload a file to a protected directory, bypassing ACL checks via <code>httpserver/updown.go:18-60</code>. Example: <code>PUT /protected/put-created.txt</code></li>
<li>Alternatively, the attacker sends an unauthenticated multipart POST request to <code>/upload</code> endpoint to upload a file to a protected directory, bypassing ACL checks via <code>httpserver/updown.go:63-165</code>. Example: <code>POST /protected/upload</code></li>
<li>The attacker sends an unauthenticated request with the <code>?mkdir</code> parameter to create a directory within the protected directory, bypassing ACL checks via <code>httpserver/handler.go:901-937</code>. Example: <code>/?mkdir=new_directory</code></li>
<li>The attacker sends an unauthenticated request with the <code>?delete</code> parameter targeting the <code>.goshs</code> file within the protected directory, leveraging the vulnerable route in <code>httpserver/handler.go:679-698</code>. Example: <code>/.goshs?delete</code></li>
<li>The server deletes the <code>.goshs</code> file using <code>os.RemoveAll()</code>, effectively removing the access control restrictions for the directory.</li>
<li>The attacker sends an unauthenticated request to access previously protected files, which are now accessible due to the absence of the <code>.goshs</code> file.</li>
<li>The attacker gains unauthorized access to sensitive information and can perform further malicious actions, such as deleting or modifying critical files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to bypass intended access controls in Goshs deployments. This can lead to unauthorized access to sensitive files, potentially exposing confidential information. Attackers can also create, modify, or delete files within protected directories, causing data corruption or service disruption. The ability to delete the <code>.goshs</code> file directly amplifies the impact, as it permanently removes the authentication barrier, affecting all previously protected content. This vulnerability poses a significant threat to the confidentiality, integrity, and availability of Goshs-hosted data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-supplied patch or upgrade to a version of Goshs that addresses CVE-2026-40189.</li>
<li>Deploy the Sigma rule &ldquo;Detect Goshs Unauthenticated .goshs Deletion&rdquo; to your SIEM to detect attempts to remove <code>.goshs</code> ACL files via the <code>?delete</code> parameter.</li>
<li>Deploy the Sigma rule &ldquo;Detect Goshs Unauthenticated PUT Request to Protected Directories&rdquo; to detect unauthorized file uploads to protected directories.</li>
<li>Monitor web server logs for PUT, POST, and DELETE requests targeting directories containing <code>.goshs</code> files to identify potential exploitation attempts. (Log Source: webserver)</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authorization bypass</category><category>acl</category><category>file upload</category><category>file deletion</category><category>CVE-2026-40189</category></item><item><title>goshs Unauthenticated Arbitrary File Deletion via Path Traversal</title><link>https://feed.craftedsignal.io/briefs/2026-04-goshs-path-traversal/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-goshs-path-traversal/</guid><description>The goshs application is vulnerable to unauthenticated path traversal (CVE-2026-35471) due to a missing return statement in the `deleteFile()` function, allowing attackers to delete arbitrary files and directories using a crafted GET request.</description><content:encoded><![CDATA[<p>The goshs application, a simple static file server written in Go, is vulnerable to a path traversal vulnerability (CVE-2026-35471). This flaw exists within the <code>deleteFile</code> function (<code>httpserver/handler.go</code>) due to a missing <code>return</code> statement after a check for path traversal attempts using <code>..</code>. Specifically, if a request contains double-encoded path traversal sequences (e.g., <code>%252e%252e</code>), the check fails to prevent subsequent file deletion. This vulnerability, present in versions prior to 1.1.5-0.20260401172448-237f3af891a9, allows an unauthenticated attacker to delete arbitrary files and directories on the server. The vulnerability affects default configurations of goshs, requiring no authentication or specific flags to be set.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a goshs instance running a vulnerable version (prior to 1.1.5-0.20260401172448-237f3af891a9).</li>
<li>The attacker crafts a GET request to a file path containing double-encoded path traversal sequences (<code>%252e%252e</code>) to bypass the path traversal check in <code>deleteFile()</code>.</li>
<li>The GET request includes the <code>?delete</code> parameter to trigger the file deletion logic.</li>
<li>The <code>deleteFile()</code> function receives the request and decodes the path, but the missing <code>return</code> after the path traversal check allows the execution to continue.</li>
<li>The <code>os.RemoveAll()</code> function is called with the manipulated path, leading to the deletion of arbitrary files or directories outside the intended webroot.</li>
<li>The server responds with HTTP status code 200, even if the file deletion was successful or resulted in an error.</li>
<li>The attacker verifies the deletion of the targeted file/directory.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability allows an unauthenticated attacker to delete any file or directory accessible to the goshs process. This could lead to data loss, system instability, or complete compromise of the server if critical system files are deleted. While the exact number of vulnerable instances is unknown, any organization using goshs versions prior to 1.1.5-0.20260401172448-237f3af891a9 is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to goshs version 1.1.5-0.20260401172448-237f3af891a9 or later to patch CVE-2026-35471.</li>
<li>Deploy the Sigma rule &ldquo;Detect goshs Path Traversal Attempt via URL Encoding&rdquo; to identify ongoing exploitation attempts based on double-encoded path traversal sequences in HTTP requests.</li>
<li>Monitor web server logs for GET requests containing double-encoded &ldquo;..&rdquo; sequences and the &ldquo;?delete&rdquo; parameter, indicative of exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>path-traversal</category><category>file-deletion</category><category>goshs</category></item><item><title>Perfmatters WordPress Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4350)</title><link>https://feed.craftedsignal.io/briefs/2026-04-perfmatters-file-deletion/</link><pubDate>Fri, 03 Apr 2026 08:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-perfmatters-file-deletion/</guid><description>The Perfmatters plugin for WordPress versions up to 2.5.9.1 is vulnerable to arbitrary file deletion via path traversal, allowing authenticated attackers with minimal privileges to delete sensitive files.</description><content:encoded><![CDATA[<p>The Perfmatters plugin, a popular WordPress performance optimization tool, contains a critical vulnerability (CVE-2026-4350) affecting versions up to and including 2.5.9.1. This flaw enables authenticated attackers with Subscriber-level access, the lowest privilege level in WordPress, to delete arbitrary files on the server. The vulnerability stems from the <code>PMCS::action_handler()</code> method&rsquo;s failure to sanitize the <code>$_GET['delete']</code> parameter. This lack of validation allows for path traversal attacks using sequences like <code>../</code>, enabling attackers to navigate outside the intended storage directory and delete any accessible file. Successful exploitation can lead to the deletion of critical files such as <code>wp-config.php</code>, effectively disabling the website and potentially allowing a full site takeover.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using a vulnerable version (&lt;=2.5.9.1) of the Perfmatters plugin.</li>
<li>Attacker gains Subscriber-level access to the WordPress site. This can be achieved through registration or compromised credentials.</li>
<li>Attacker crafts a malicious HTTP GET request targeting the WordPress site. The request includes the <code>delete</code> parameter with a path traversal payload. For example: <code>?delete=../../../../wp-config.php</code>.</li>
<li>The request is sent to the <code>PMCS::action_handler()</code> method within the Perfmatters plugin.</li>
<li>The <code>PMCS::action_handler()</code> method processes the unsanitized <code>$_GET['delete']</code> parameter.</li>
<li>The plugin concatenates the malicious path with the storage directory.</li>
<li>The <code>unlink()</code> function executes, deleting the file specified by the attacker&rsquo;s path traversal payload.</li>
<li>If the attacker successfully deletes <code>wp-config.php</code>, the WordPress site becomes inaccessible and redirects to the installation wizard, potentially allowing for complete site takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4350 allows attackers to delete arbitrary files on a vulnerable WordPress server. A key target is <code>wp-config.php</code>, which contains sensitive database credentials. Deleting this file forces WordPress into the installation wizard, potentially leading to a full site takeover. The impact ranges from defacement and data loss to complete control of the website, impacting businesses, organizations, and individuals relying on WordPress for their online presence. The ease of exploitation due to the low privilege requirements makes this a high-risk vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Perfmatters plugin to the latest version to patch CVE-2026-4350.</li>
<li>Implement the provided Sigma rule <code>Detect Perfmatters Arbitrary File Deletion Attempt</code> to identify potential exploitation attempts based on <code>cs-uri-query</code> in web server logs.</li>
<li>Consider implementing rate limiting on requests to <code>wp-admin/options.php</code> to mitigate potential brute-force exploitation attempts targeting this vulnerability.</li>
<li>Review web server access logs for unusual patterns in <code>cs-uri-query</code> parameters containing <code>../</code> sequences, as these may indicate path traversal attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-4350</category><category>wordpress</category><category>perfmatters</category><category>file-deletion</category><category>path-traversal</category></item><item><title>Endian Firewall Arbitrary File Deletion via Path Traversal (CVE-2026-34790)</title><link>https://feed.craftedsignal.io/briefs/2026-04-endian-traversal/</link><pubDate>Thu, 02 Apr 2026 15:16:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-endian-traversal/</guid><description>Endian Firewall versions 3.3.25 and prior allow authenticated users to delete arbitrary files due to a path traversal vulnerability in the `remove ARCHIVE` parameter of the `/cgi-bin/backup.cgi` script, leading to unauthorized file system modification.</description><content:encoded><![CDATA[<p>Endian Firewall, a security-focused Linux distribution designed for gateway security, is vulnerable to a path traversal attack. Specifically, versions 3.3.25 and earlier are affected by CVE-2026-34790. An authenticated user, with low-level privileges, can exploit this vulnerability to delete arbitrary files on the system. The flaw resides in the <code>/cgi-bin/backup.cgi</code> script where the <code>remove ARCHIVE</code> parameter is not properly sanitized. This allows an attacker to inject directory traversal sequences (e.g., <code>../</code>) into the file path, bypassing intended restrictions. This can lead to deletion of sensitive files, potentially disrupting system operations or facilitating further malicious activities. The vulnerability was reported in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Endian Firewall web interface.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/cgi-bin/backup.cgi</code>.</li>
<li>The request includes the <code>remove ARCHIVE</code> parameter with a payload containing directory traversal sequences (e.g., <code>../../../../etc/shadow</code>).</li>
<li>The <code>/cgi-bin/backup.cgi</code> script receives the request and constructs a file path using the unsanitized <code>remove ARCHIVE</code> parameter.</li>
<li>The script calls the <code>unlink()</code> function with the attacker-controlled file path.</li>
<li>The <code>unlink()</code> function deletes the file specified by the manipulated path.</li>
<li>The attacker repeats this process to delete other critical system files.</li>
<li>This can lead to a denial-of-service condition, data loss, or the potential for further system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to delete arbitrary files on the Endian Firewall system. This can result in a denial-of-service (DoS) condition if critical system files are removed. An attacker may target configuration files, logs, or even binaries, leading to system instability or the disabling of security features. The number of potential victims is dependent on the number of Endian Firewall deployments running vulnerable versions (3.3.25 and prior). Given that Endian Firewall is often used in small to medium-sized businesses, the impact could range from disruption of network services to potential data breaches, depending on the specific files targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a version of Endian Firewall that addresses CVE-2026-34790 to remediate the vulnerability.</li>
<li>Monitor web server logs for requests to <code>/cgi-bin/backup.cgi</code> containing directory traversal sequences (e.g., <code>../</code>, <code>..\\</code>) in the <code>remove ARCHIVE</code> parameter using the provided Sigma rule &ldquo;Detect Endian Firewall Path Traversal Attempt&rdquo;.</li>
<li>Implement input validation and sanitization on all user-supplied input, especially within CGI scripts like <code>/cgi-bin/backup.cgi</code>, to prevent path traversal attacks.</li>
<li>Restrict access to the Endian Firewall web interface to trusted networks or users and enforce strong authentication measures.</li>
<li>Regularly back up the Endian Firewall configuration and critical system files to mitigate the impact of potential data loss due to successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>path-traversal</category><category>file-deletion</category><category>web-application</category></item><item><title>WebServer Access Logs Deleted</title><link>https://feed.craftedsignal.io/briefs/2026-04-websvr-log-deletion/</link><pubDate>Wed, 01 Apr 2026 14:12:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-websvr-log-deletion/</guid><description>Detection of web server access log deletion across Windows, Linux, and macOS systems indicates potential defense evasion and destruction of forensic evidence by threat actors.</description><content:encoded><![CDATA[<p>This rule detects the deletion of web server access logs, a common tactic used by attackers to cover their tracks and hinder forensic investigations. The deletion of these logs may indicate an attempt to evade detection or destroy forensic evidence on a system. This detection rule focuses on identifying deletion events in directories commonly used for web server logs, such as those used by Apache and IIS. The rule covers multiple operating systems, providing a broad detection capability. This is important for defenders because web server logs are critical for monitoring web traffic and identifying malicious activity. The rule is designed to detect activity on &ldquo;auditbeat-<em>&rdquo;, &ldquo;winlogbeat-</em>&rdquo;, &ldquo;logs-endpoint.events.<em>&rdquo;, &ldquo;logs-windows.sysmon_operational-</em>&rdquo; indices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a system hosting a web server, potentially through exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker identifies the location of the web server&rsquo;s access logs. Common locations include <code>/var/log/apache*/access.log</code> and <code>C:\\inetpub\\logs\\LogFiles\\*.log</code>.</li>
<li>The attacker uses a privileged account or escalates privileges to obtain the necessary permissions to delete the log files.</li>
<li>The attacker executes a command to delete the web server access logs. This could be done using <code>rm</code> on Linux or <code>del</code> on Windows.</li>
<li>The operating system records the file deletion event in its audit logs, which are monitored by security tools.</li>
<li>The detection rule identifies the deletion event based on the file path and event type.</li>
<li>The security team is alerted to the potential intrusion and begins investigating the incident.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of web server access logs can significantly impede incident response and forensic investigations. Without these logs, it becomes difficult to determine the scope and impact of an attack, including identifying compromised accounts, exploited vulnerabilities, and stolen data. This can lead to delayed or ineffective remediation efforts, potentially resulting in further damage to the organization. The impact is particularly severe if the logs are deleted before suspicious activity is detected, as it removes valuable evidence needed for analysis.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>WebServer Access Logs Deleted</code> to your SIEM and tune for your environment to detect malicious log deletion attempts.</li>
<li>Enable file integrity monitoring (FIM) on web server log directories to detect unauthorized modifications or deletions.</li>
<li>Review and tighten access controls on web server log files to ensure only authorized personnel can modify or delete them.</li>
<li>Implement a robust log backup and retention policy to ensure that logs are available for forensic analysis even if they are deleted from the primary system.</li>
<li>Investigate any alerts generated by the <code>WebServer Access Logs Deleted</code> rule promptly to determine the root cause and extent of the compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>indicator-removal</category><category>file-deletion</category></item><item><title>WP Job Portal Plugin Arbitrary File Deletion Vulnerability (CVE-2026-4758)</title><link>https://feed.craftedsignal.io/briefs/2026-03-wp-job-portal-file-deletion/</link><pubDate>Thu, 26 Mar 2026 00:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-wp-job-portal-file-deletion/</guid><description>The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation, allowing authenticated attackers with subscriber-level access or higher to delete arbitrary files, potentially leading to remote code execution.</description><content:encoded><![CDATA[<p>The WP Job Portal plugin for WordPress versions up to and including 2.4.9 is susceptible to an arbitrary file deletion vulnerability (CVE-2026-4758). The vulnerability stems from insufficient file path validation within the <code>WPJOBPORTALcustomfields::removeFileCustom</code> function. Authenticated attackers with Subscriber-level access or higher can exploit this flaw to delete arbitrary files on the server. Successful exploitation allows attackers to delete critical files such as <code>wp-config.php</code>…</p>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve</category><category>wordpress</category><category>file-deletion</category><category>remote-code-execution</category></item></channel></rss>