CVE-2025-14344

CRITICAL
2025-12-12 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Apr 08, 2026 - 18:38 vuln.today
CVE Published
Dec 12, 2025 - 04:15 nvd
CRITICAL 9.8

Description

The Multi Uploader for Gravity Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'plupload_ajax_delete_file' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server.

Analysis

Arbitrary file deletion in Multi Uploader for Gravity Forms (WordPress plugin ≤1.1.7) allows unauthenticated remote attackers to delete any file on the server through insufficient path validation in the plupload_ajax_delete_file function. Exploitation requires no credentials or user interaction. CVSS 9.8 Critical severity reflects network-accessible attack with high impact to confidentiality, integrity, and availability. Low observed exploitation activity (EPSS 0.37%). No public exploit identified at time of analysis.

Technical Context

Path traversal (CWE-22) in plupload_ajax_delete_file function (GFMUHandlePluploader.class.php lines 41-43) lacks sanitization of user-controlled file paths. Unauthenticated execution (PR:N) permits direct server file deletion without authentication barriers, affecting all 1.1.7 and prior releases.

Affected Products

Multi Uploader for Gravity Forms plugin versions ≤1.1.7, WordPress platform. Vendor: Unknown/Third-party developer. CPE not provided in source data.

Remediation

Upstream fix available (changeset 3421317); released patched version not independently confirmed at time of analysis. Immediately deactivate Multi Uploader for Gravity Forms plugin ≤1.1.7 until vendor confirms released fix version. Monitor WordPress plugin repository for version >1.1.7. Apply security hardening: restrict wp-admin access, implement file integrity monitoring for critical directories, review server logs for unauthorized deletion attempts. Vendor advisory and technical details: https://www.wordfence.com/threat-intel/vulnerabilities/id/346af237-0411-4cc4-9544-eab697385a2f?source=cve and https://plugins.trac.wordpress.org/changeset/3421317/

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +49
POC: 0

Share

CVE-2025-14344 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy