EUVD-2025-18083

| CVE-2025-4799 HIGH
2025-06-11 [email protected]
7.2
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 21:09 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:09 euvd
EUVD-2025-18083
Patch Released
Mar 14, 2026 - 21:09 nvd
Patch available
CVE Published
Jun 11, 2025 - 04:15 nvd
HIGH 7.2

DescriptionNVD

The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file deletion due to lack of restriction on the directory a file can be deleted from in all versions up to, and including, 1.68.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This vulnerability can be paired with CVE-2025-4798 to delete any file within the WordPress root directory.

AnalysisAI

WP-DownloadManager plugin for WordPress versions up to 1.68.10 contains an arbitrary file deletion vulnerability (CVE-2025-4799) that allows authenticated administrators to delete any file on the server without directory restrictions. When paired with CVE-2025-4798, attackers can delete critical files like wp-config.php, leading to remote code execution. The vulnerability requires high-privilege administrative access, resulting in a CVSS 7.2 score with high confidentiality, integrity, and availability impact.

Technical ContextAI

The WP-DownloadManager plugin fails to implement proper path validation and directory traversal protections in its file deletion functionality, violating CWE-36 (Absolute Path Traversal). The plugin processes file deletion requests from authenticated users without validating that the target file resides within an intended directory scope, allowing attackers to specify absolute or relative paths to any filesystem location readable/writable by the web server process. This is a classic path normalization failure compounded by inadequate access control checks. The vulnerability is particularly severe in WordPress environments where the web server typically runs with permissions encompassing configuration files and core installation files. CPE identification: cpe:2.7a:wp-downloadmanager:wp-downloadmanager:*:*:*:*:*:wordpress:*

RemediationAI

Vendor Patch: Update WP-DownloadManager plugin to version 1.68.11 or later when released; priority: CRITICAL Interim Mitigation: Restrict administrator role assignments to trusted users only; audit existing administrator accounts for unauthorized access; priority: IMMEDIATE Interim Mitigation: Disable or deactivate WP-DownloadManager plugin if file deletion functionality is not essential pending patch release; priority: HIGH Defensive Monitoring: Monitor WordPress admin logs and database for unusual file deletion requests; monitor filesystem for unexpected modifications to wp-config.php and other critical files; priority: HIGH Access Control: Implement principle of least privilege for administrator accounts; separate administrative roles where possible to reduce blast radius of compromised high-privilege accounts; priority: MEDIUM

Share

EUVD-2025-18083 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy