CVE-2025-14344
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Tags
Description
The Multi Uploader for Gravity Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'plupload_ajax_delete_file' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server.
Analysis
Arbitrary file deletion in Multi Uploader for Gravity Forms (WordPress plugin ≤1.1.7) allows unauthenticated remote attackers to delete any file on the server through insufficient path validation in the plupload_ajax_delete_file function. Exploitation requires no credentials or user interaction. CVSS 9.8 Critical severity reflects network-accessible attack with high impact to confidentiality, integrity, and availability. Low observed exploitation activity (EPSS 0.37%). No public exploit identified at time of analysis.
Technical Context
Path traversal (CWE-22) in plupload_ajax_delete_file function (GFMUHandlePluploader.class.php lines 41-43) lacks sanitization of user-controlled file paths. Unauthenticated execution (PR:N) permits direct server file deletion without authentication barriers, affecting all 1.1.7 and prior releases.
Affected Products
Multi Uploader for Gravity Forms plugin versions ≤1.1.7, WordPress platform. Vendor: Unknown/Third-party developer. CPE not provided in source data.
Remediation
Upstream fix available (changeset 3421317); released patched version not independently confirmed at time of analysis. Immediately deactivate Multi Uploader for Gravity Forms plugin ≤1.1.7 until vendor confirms released fix version. Monitor WordPress plugin repository for version >1.1.7. Apply security hardening: restrict wp-admin access, implement file integrity monitoring for critical directories, review server logs for unauthorized deletion attempts. Vendor advisory and technical details: https://www.wordfence.com/threat-intel/vulnerabilities/id/346af237-0411-4cc4-9544-eab697385a2f?source=cve and https://plugins.trac.wordpress.org/changeset/3421317/
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today