CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Lifecycle Timeline
2DescriptionNVD
The Malcure Malware Scanner - #1 Toolset for WordPress Malware Removal plugin for WordPress is vulnerable to Arbitrary File Deletion due to a missing capability check on the wpmr_delete_file() function in all versions up to, and including, 17.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files making remote code execution possible. This is only exploitable when advanced mode is enabled on the site.
AnalysisAI
Arbitrary file deletion in Malcure Malware Scanner for WordPress (versions ≤17.0) permits authenticated attackers with Subscriber-level privileges to delete critical system files via wpmr_delete_file() function lacking capability checks. Exploitation enables path traversal to wp-config.php or other core files, creating conditions for remote code execution through redeployment of malicious files. Vulnerability active only when plugin's advanced mode enabled. Affects authenticated low-privilege users (PR:L). No public exploit identified at time of analysis.
Technical ContextAI
CWE-862 missing authorization flaw in wpmr_delete_file() function (wpmr.php lines 4570, 6304, 6401) permits any authenticated user to bypass intended access controls. Function accepts user-controlled file paths without validating caller permissions or sanitizing directory traversal sequences, enabling deletion of files outside plugin scope when advanced mode configuration unlocks functionality.
Affected ProductsAI
Malcure Malware Scanner (WP Malware Removal), vendor Malcure Security, WordPress plugin versions up to and including 17.0. Vulnerable instances require advanced mode activation. CPE: cpe:2.3:a:malcure:malware_scanner:*:*:*:*:*:wordpress:*:* (versions ≤17.0).
RemediationAI
Vendor-released patch status: Upstream fix available (PR/commit); released patched version not independently confirmed. Based on Trac repository references showing vulnerable code in version 16.8, users should verify availability of version 17.1 or later from WordPress plugin repository. Immediate mitigation: Disable advanced mode in plugin settings to prevent exploitation surface. For critical environments, deactivate plugin entirely until patched release confirmed. Implement file integrity monitoring to detect unauthorized deletions. Restrict Subscriber-level account creation and audit existing low-privilege users. Review WordPress security advisory: https://www.wordfence.com/threat-intel/vulnerabilities/id/d44fe4d7-1af5-4e26-a33c-43a9cce4174c?source=cve for vendor updates and technical indicators of compromise.
Share
External POC / Exploit Code
Leaving vuln.today