Description
The Database Toolset plugin is vulnerable to arbitrary file deletion due to insufficient file path validation in a function in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Published: 2025-04-24
Score: 9.1 Critical
EPSS: 4.4% Low
KEV: No
Impact: Remote code execution
Action: Immediate Patch
AI Analysis

Impact

The Database Toolset plugin allows unauthenticated users to delete arbitrary files on the server because the file path validation is not performed when a request is made to a function present in all releases up to 1.8.4. An attacker can target critical WordPress files such as wp-config.php; deleting this file can drop the site into a state that permits arbitrary code execution or other destructive actions. The resulting loss of configuration, content, and potentially the ability to install malware is severe.

Affected Systems

Neoslab Database Toolset plugin for WordPress, any version installed on the site with a version number of 1.8.4 or earlier is affected. The vulnerability exists for all installations that have the plugin active and do not employ additional access controls on its administrative functionality.

Risk and Exploitability

The CVSS score of 9.1 indicates a high severity, and the EPSS of 4% suggests the exploit is moderately likely to be seen in real-world traffic. The vulnerability is not listed in CISA KEV, meaning no known large-scale exploitation campaign has been formally documented yet. Attackers can trigger the deletion via an unauthenticated HTTP request to the plugin’s admin endpoint, so any publicly accessible WordPress site running the affected plugin is at risk.

Generated by OpenCVE AI on April 22, 2026 at 17:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Database Toolset plugin to the latest released version that addresses the file‑deletion flaw, or uninstall it if no newer release is available.
  • Temporarily disable or delete the plugin from the WordPress installation until a secure version can be applied.
  • Restrict access to the WordPress admin area and the plugin’s configuration pages by IP whitelisting or enforcing stronger authentication so that only trusted users can reach the vulnerable endpoints.

Generated by OpenCVE AI on April 22, 2026 at 17:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-12133 The Database Toolset plugin is vulnerable to arbitrary file deletion due to insufficient file path validation in a function in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01638}

epss

{'score': 0.01141}


Thu, 24 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 24 Apr 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Database Toolset plugin is vulnerable to arbitrary file deletion due to insufficient file path validation in a function in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Title Database Toolset <= 1.8.4 - Unauthenticated Arbitrary File Deletion
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:35:28.112Z

Reserved: 2025-03-31T22:35:46.146Z

Link: CVE-2025-3065

cve-icon Vulnrichment

Updated: 2025-04-24T13:48:19.527Z

cve-icon NVD

Status : Deferred

Published: 2025-04-24T09:15:30.663

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3065

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T17:30:22Z

Weaknesses