Description
The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Path Traversal and Arbitrary File Deletion in all versions up to, and including, 1.6. This is due to missing nonce validation and insufficient file path validation on the delete action in the 'appform_options_page_html' function. This makes it possible for unauthenticated attackers to delete arbitrary files on the server via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-04-16
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Deletion
Action: Immediate Patch
AI Analysis

Impact

The Career Section plugin for WordPress has a missing nonce guard and insufficient file path validation in its delete action. This flaw allows an attacker to forge a request and delete any file on the server. An unauthenticated user can exploit this by luring an administrator to click a crafted link, resulting in accidental removal of critical files and potential site downtime. The weakness is a path traversal error (CWE‑22).

Affected Systems

WordPress installations running the “Career Section” plugin by shahinurislam up to version 1.6 are affected. All earlier releases are potentially vulnerable as well.

Risk and Exploitability

The flaw carries a CVSS v3.1 score of 8.8, indicating high severity. No EPSS score is published, and the vulnerability is not currently listed in CISA’s KEV catalog. Exploitation requires social engineering to get an administrator to trigger the delete request; the lack of authentication does not directly reduce the barrier, but the need for an admin click makes it less likely than purely remote exploits. Nevertheless, the potential impact of mass file deletion warrants vigilant mitigation.

Generated by OpenCVE AI on April 16, 2026 at 08:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Career Section plugin to the latest version, which removes the CSRF and path traversal flaw.
  • If an update is not immediately possible, disable or uninstall the plugin to prevent the attack vector.
  • Enable all plugin administrators to use two‑factor authentication and reinforce safe logging to detect suspicious file deletion attempts.

Generated by OpenCVE AI on April 16, 2026 at 08:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Shahinurislam
Shahinurislam career Section
Wordpress
Wordpress wordpress
Vendors & Products Shahinurislam
Shahinurislam career Section
Wordpress
Wordpress wordpress

Thu, 16 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Description The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Path Traversal and Arbitrary File Deletion in all versions up to, and including, 1.6. This is due to missing nonce validation and insufficient file path validation on the delete action in the 'appform_options_page_html' function. This makes it possible for unauthenticated attackers to delete arbitrary files on the server via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
Title Career Section <= 1.6 - Cross-Site Request Forgery to Arbitrary File Deletion
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Subscriptions

Shahinurislam Career Section
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-16T12:52:42.034Z

Reserved: 2025-12-18T03:30:13.946Z

Link: CVE-2025-14868

cve-icon Vulnrichment

Updated: 2026-04-16T12:52:29.687Z

cve-icon NVD

Status : Received

Published: 2026-04-16T08:16:26.773

Modified: 2026-04-16T08:16:26.773

Link: CVE-2025-14868

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T09:11:35Z

Weaknesses