CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4DescriptionNVD
The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file deletion due to lack of restriction on the directory a file can be deleted from in all versions up to, and including, 1.68.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This vulnerability can be paired with CVE-2025-4798 to delete any file within the WordPress root directory.
AnalysisAI
WP-DownloadManager plugin for WordPress versions up to 1.68.10 contains an arbitrary file deletion vulnerability (CVE-2025-4799) that allows authenticated administrators to delete any file on the server without directory restrictions. When paired with CVE-2025-4798, attackers can delete critical files like wp-config.php, leading to remote code execution. The vulnerability requires high-privilege administrative access, resulting in a CVSS 7.2 score with high confidentiality, integrity, and availability impact.
Technical ContextAI
The WP-DownloadManager plugin fails to implement proper path validation and directory traversal protections in its file deletion functionality, violating CWE-36 (Absolute Path Traversal). The plugin processes file deletion requests from authenticated users without validating that the target file resides within an intended directory scope, allowing attackers to specify absolute or relative paths to any filesystem location readable/writable by the web server process. This is a classic path normalization failure compounded by inadequate access control checks. The vulnerability is particularly severe in WordPress environments where the web server typically runs with permissions encompassing configuration files and core installation files. CPE identification: cpe:2.7a:wp-downloadmanager:wp-downloadmanager:*:*:*:*:*:wordpress:*
RemediationAI
Vendor Patch: Update WP-DownloadManager plugin to version 1.68.11 or later when released; priority: CRITICAL Interim Mitigation: Restrict administrator role assignments to trusted users only; audit existing administrator accounts for unauthorized access; priority: IMMEDIATE Interim Mitigation: Disable or deactivate WP-DownloadManager plugin if file deletion functionality is not essential pending patch release; priority: HIGH Defensive Monitoring: Monitor WordPress admin logs and database for unusual file deletion requests; monitor filesystem for unexpected modifications to wp-config.php and other critical files; priority: HIGH Access Control: Implement principle of least privilege for administrator accounts; separate administrative roles where possible to reduce blast radius of compromised high-privilege accounts; priority: MEDIUM
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18083