The WooMulti WordPress plugin through 17 does not validate a file parameter when deleting files, which could allow any authenticated users, such as subscriber to delete arbitrary files on the server.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 12 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 10:45:00 +0000

Type Values Removed Values Added
Description The WooMulti WordPress plugin through 17 does not validate a file parameter when deleting files, which could allow any authenticated users, such as subscriber to delete arbitrary files on the server.
Title WooMulti <= 1.7 - Subscriber+ Arbitrary File Deletion
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-12-12T17:51:06.176Z

Reserved: 2025-11-06T19:58:23.708Z

Link: CVE-2025-12835

cve-icon Vulnrichment

Updated: 2025-12-12T17:51:02.219Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-12T11:15:50.150

Modified: 2025-12-12T18:15:37.663

Link: CVE-2025-12835

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-14T21:16:34Z

Weaknesses

No weakness.