Description
Cross-Site Request Forgery (CSRF) vulnerability in Vladimir Prelovac Plugin Central plugin-central allows Path Traversal.This issue affects Plugin Central: from n/a through <= 2.5.1.
Published: 2025-04-24
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The bug is a Cross‑Site Request Forgery that allows a malicious actor to craft requests that delete arbitrary files on the WordPress site. The vulnerability depends on a path traversal flaw in the Plugin Central plugin, permitting the attacker to target any file path the web server can access. When successfully executed the result is loss of critical files, possibly including configuration, code, or backups. The impact is primarily loss of availability and integrity, with potential for secret data exposure if sensitive files are removed or replaced.

Affected Systems

Vladimir Prelovac’s Plugin Central plugin is affected for all releases up to and including version 2.5.1. A site running any of those releases with the plugin activated is at risk. No additional product versions or operating systems are listed.

Risk and Exploitability

The CVSS score of 7.4 indicates a high severity, while the EPSS score of less than 1% suggests low current exploit prevalence. The vulnerability is not listed in the CISA KEV catalogue. Inference: the likely attack vector is a CSRF attack that requires a victim who is logged into the WordPress site to be tricked into sending a request to the deletion endpoint. An attacker could send a malicious link or embed an image that triggers the deletion. Because the flaw involves path traversal, the attacker can specify file paths beyond the intended scope, escalating damage.

Generated by OpenCVE AI on April 30, 2026 at 21:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Plugin Central plugin to a version newer than 2.5.1 once the vendor releases a fix.
  • If an update cannot be applied immediately, restrict the deletion endpoint so that only properly authenticated and authorized requests can reach it, or remove the endpoint entirely from the plugin configuration.
  • Evaluate and disable the Plugin Central plugin on any temporary basis until a patch is applied, and verify that no critical files remain exposed on the server.

Generated by OpenCVE AI on April 30, 2026 at 21:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-12062 Cross-Site Request Forgery (CSRF) vulnerability in Vladimir Prelovac Plugin Central allows Path Traversal. This issue affects Plugin Central: from n/a through 2.5.1.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Vladimir Prelovac Plugin Central allows Path Traversal. This issue affects Plugin Central: from n/a through 2.5.1. Cross-Site Request Forgery (CSRF) vulnerability in Vladimir Prelovac Plugin Central plugin-central allows Path Traversal.This issue affects Plugin Central: from n/a through <= 2.5.1.
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H'}


Fri, 25 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 24 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Vladimir Prelovac Plugin Central allows Path Traversal. This issue affects Plugin Central: from n/a through 2.5.1.
Title WordPress Plugin Central plugin <= 2.5.1 - CSRF to Arbitrary File Deletion vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:37.644Z

Reserved: 2025-04-24T14:22:09.615Z

Link: CVE-2025-46439

cve-icon Vulnrichment

Updated: 2025-04-24T19:55:50.428Z

cve-icon NVD

Status : Deferred

Published: 2025-04-24T16:15:35.057

Modified: 2026-04-23T15:29:59.473

Link: CVE-2025-46439

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T21:15:06Z

Weaknesses