<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File-Overwrite — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file-overwrite/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 10 Apr 2026 02:37:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file-overwrite/feed.xml" rel="self" type="application/rss+xml"/><item><title>Perfmatters WordPress Plugin Arbitrary File Overwrite Vulnerability (CVE-2026-4351)</title><link>https://feed.craftedsignal.io/briefs/2026-04-perfmatters-overwrite/</link><pubDate>Fri, 10 Apr 2026 02:37:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-perfmatters-overwrite/</guid><description>The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal, allowing authenticated attackers with subscriber-level access to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service.</description><content:encoded><![CDATA[<p>The Perfmatters plugin for WordPress, in versions up to and including 2.5.9, is vulnerable to an arbitrary file overwrite vulnerability (CVE-2026-4351). This vulnerability stems from the <code>PMCS::action_handler()</code> method&rsquo;s processing of bulk <code>activate</code>/<code>deactivate</code> actions without proper authorization checks or nonce verification. The unsanitized <code>$_GET['snippets'][]</code> values are then passed to <code>Snippet::activate()</code>/<code>Snippet::deactivate()</code>, which subsequently call <code>Snippet::update()</code> and <code>file_put_contents()</code> with a traversed path. An authenticated attacker with subscriber-level privileges can exploit this flaw to overwrite arbitrary files on the server with a fixed PHP docblock, leading to a potential denial-of-service condition by corrupting critical files such as <code>.htaccess</code> or <code>index.php</code>. This vulnerability allows low-privileged users to gain elevated privileges on the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the WordPress site with subscriber-level access.</li>
<li>Attacker crafts a malicious HTTP GET request targeting the WordPress installation.</li>
<li>The GET request includes the <code>pmcs_action</code> parameter set to <code>bulk_activate</code> or <code>bulk_deactivate</code>.</li>
<li>The GET request includes the <code>snippets[]</code> parameter containing a path traversal payload, such as <code>../../../.htaccess</code>.</li>
<li>The <code>PMCS::action_handler()</code> function processes the request without proper authorization or nonce validation.</li>
<li>The <code>Snippet::activate()</code> or <code>Snippet::deactivate()</code> functions are called, leading to <code>Snippet::update()</code>.</li>
<li><code>Snippet::update()</code> then calls <code>file_put_contents()</code> with the attacker-controlled path.</li>
<li>The attacker overwrites the targeted file (e.g., <code>.htaccess</code>, <code>index.php</code>) with a fixed PHP docblock, leading to a denial of service or further compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to overwrite arbitrary files on the WordPress server. Overwriting critical files like <code>.htaccess</code> or <code>index.php</code> can result in a denial-of-service condition, rendering the website unavailable. In some cases, this could be leveraged for further compromise by injecting malicious code into other PHP files or modifying server configurations. The vulnerability affects all installations using the Perfmatters plugin version 2.5.9 or earlier.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Perfmatters plugin to the latest version to patch CVE-2026-4351.</li>
<li>Deploy the Sigma rule <code>Detect Perfmatters Arbitrary File Overwrite Attempt</code> to monitor for exploitation attempts targeting this vulnerability via HTTP GET requests.</li>
<li>Monitor web server logs for suspicious GET requests containing <code>pmcs_action=bulk_activate</code> or <code>pmcs_action=bulk_deactivate</code> and path traversal sequences within the <code>snippets[]</code> parameter.</li>
<li>Implement strict file permission controls to limit the impact of potential file overwrite vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>perfmatters</category><category>file-overwrite</category><category>path-traversal</category></item></channel></rss>