Impact
The vulnerability is an improper limitation of a pathname to a restricted directory, enabling path traversal and arbitrary deletion of files. An attacker can cause loss of critical files, potentially disrupting site operation or corrupting data. This weakness falls under CWE‑22.
Affected Systems
The flaw affects the WordPress User Extra Fields plugin developed by vanquish, with all releases up to version 17.0 being vulnerable. Any WordPress installation that uses the plugin before the 17.1 update is exposed to this issue.
Risk and Exploitability
The CVSS score of 7.7 indicates high severity, but the EPSS score of less than 1 percent suggests exploitation is unlikely at the moment. The vulnerability is not listed in the CISA KEV catalog. Exploitation most likely requires a web-based request that can influence the file path parameter sent to the plugin’s deletion routine; no explicit authentication or elevated privileges are mentioned, indicating local control of the site may suffice.
OpenCVE Enrichment