Description
The Image Resizer On The Fly plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete' task in all versions up to, and including, 1.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Published: 2025-06-14
Score: 9.1 Critical
EPSS: 7.0% Low
KEV: No
Impact: Unauthenticated arbitrary file deletion that can lead to remote code execution
Action: Immediate Patch
AI Analysis

Impact

The Image Resizer On The Fly plugin contains insufficient file path validation in its delete operation, allowing any visitor to trigger deletion of arbitrary files on the server. This flaw could be exploited to remove critical configuration files such as wp-config.php, thereby enabling an attacker to execute arbitrary code on the host. The weakness is a classic path traversal or directory traversal attack (CWE-22). The impact is loss of confidentiality, integrity, and availability, and can result in full control of the site if a key file is removed or replaced.

Affected Systems

WordPress sites that have the wework4web Image Resizer On The Fly plugin installed in any version up to and including 1.1. The plugin is distributed via the WordPress Plugin Repository and is commonly used on production and staging sites built with WordPress.

Risk and Exploitability

With a CVSS score of 9.1 the vulnerability is considered critical, and the EPSS score of 7% indicates that exploitation is reasonably likely. The flaw is not listed in the CISA KEV catalog, but its nature allows unauthenticated attackers to trigger the delete action via an HTTP request to the plugin’s delete endpoint; based on the description, it is inferred that this is the attack vector. Once a sensitive file is removed or replaced, the attacker can leverage the resulting misconfiguration to run arbitrary code.

Generated by OpenCVE AI on April 22, 2026 at 17:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Image Resizer On The Fly to the latest available version that includes the path validation fix. This is the most effective and complete remedy.
  • Remove or deactivate the plugin if it is not required for site functionality. This eliminates the attack surface entirely.
  • Configure file and directory permissions to prevent web‑initiated deletions of critical files such as wp-config.php; consider setting those paths to read‑only for the web server process.

Generated by OpenCVE AI on April 22, 2026 at 17:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-18325 The Image Resizer On The Fly plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete' task in all versions up to, and including, 1.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01088}

epss

{'score': 0.01185}


Sat, 14 Jun 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Image Resizer On The Fly plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete' task in all versions up to, and including, 1.1. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Title Image Resizer On The Fly <= 1.1 - Unauthenticated Arbitrary File Deletion
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:36:48.610Z

Reserved: 2025-06-13T13:36:30.138Z

Link: CVE-2025-6065

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2025-06-14T09:15:25.020

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6065

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T17:30:22Z

Weaknesses