Impact
The vulnerability exists because the delete function in the CYAN Backup WordPress plugin does not properly validate file paths, enabling an authenticated administrator or higher to delete any file on the server. A careless deletion of critical files such as wp-config.php can expose configuration details and may allow an attacker to execute arbitrary code through the compromised site.
Affected Systems
Genesis products affected are the CYAN Backup plugin for WordPress; all releases up to and including version 2.5.4 are vulnerable. The plugin is commonly installed on WordPress sites where administrators have elevated privileges.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity, while an EPSS score of 2% suggests a low but non‑zero probability of exploitation. The vulnerability is not currently listed in the CISA KEV catalog. An attacker would need valid administrator credentials to trigger the delete operation, but once authenticated they can supply arbitrary file paths, making the attack simple from a technical standpoint. Proper mitigation is therefore essential to prevent accidental or malicious file removal and subsequent compromise.
OpenCVE Enrichment