Impact
The vulnerability appears in the delete_avatar_ajax() function of WP User Frontend Pro, where user-supplied file paths are not properly validated before deletion. This allows an authenticated attacker with Subscriber role or higher to specify any filesystem path, leading to arbitrary file removal. Deleting critical files such as wp-config.php can compromise WordPress configuration and permit execution of malicious code. The flaw represents a classic path traversal and deletion abuse (CWE-22).
Affected Systems
WP User Frontend Pro (wedevs) versions up to and including 4.1.3 on WordPress sites. The issue affects all installations that have been running these versions without an upgrade.
Risk and Exploitability
The CVSS score of 8.1 marks this as a high‑severity vulnerability. With an EPSS score of 6%, there is a moderate probability of exploitation. The flaw is not listed in the CISA KEV catalog, but its impact—remote code execution through file deletion—makes it a significant risk. An attacker must be able to authenticate to the WordPress site as a Subscriber or higher and then issue a crafted AJAX request to the delete_avatar_ajax() endpoint. Once the request is processed, any file on the server may be deleted, exposing the system to further compromise.
OpenCVE Enrichment
EUVD