Description
The Kallyas theme for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the delete_font() function in all versions up to, and including, 4.21.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary folders on the server.
Published: 2025-07-26
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Folder Deletion
Action: Apply Patch
AI Analysis

Impact

The Kallyas WordPress theme contains a flaw in the delete_font() function that allows authenticated users with Contributor-level permissions and higher to delete arbitrary folders on the server. This vulnerability arises from insufficient file path validation, enabling an attacker to specify unrestricted folder paths. The resulting impact is loss of files or directories, potentially compromising website functionality or data integrity.

Affected Systems

The flaw affects hogash's KALLYAS Creative eCommerce Multi‑Purpose WordPress Theme versions up to and including 4.21.0.

Risk and Exploitability

The CVSS v3 score of 8.1 indicates high severity. The EPSS score is less than 1 %, suggesting low overall exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is an authenticated user with Contributor or higher privileges. Successful exploitation requires the attacker to first authenticate to the WordPress site, after which the delete_font() endpoint can be invoked with a crafted path to remove any folder on the server. Because the attack is authenticated, sites that do not grant Contributor permissions are not exposed, but any site that does is at risk.

Generated by OpenCVE AI on April 21, 2026 at 03:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the KALLYAS theme to the latest version (4.22.0 or newer) where the delete_font() path validation has been fixed.
  • Immediately review and constrain Contributor and higher roles; revoke or limit any roles that permit access to the font management interface unless strictly necessary.
  • If an update cannot be applied immediately, disable the delete_font() functionality or remove the delete_font() endpoint from the theme temporarily so that no path deletion can occur.

Generated by OpenCVE AI on April 21, 2026 at 03:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-22782 The Kallyas theme for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the delete_font() function in all versions up to, and including, 4.21.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary folders on the server.
History

Mon, 28 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 28 Jul 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 26 Jul 2025 07:45:00 +0000

Type Values Removed Values Added
Description The Kallyas theme for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the delete_font() function in all versions up to, and including, 4.21.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary folders on the server.
Title Kallyas <= 4.21.0 - Authenticated (Contributor+) Arbitrary Folder Deletion
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:05.380Z

Reserved: 2025-07-01T21:06:01.353Z

Link: CVE-2025-6989

cve-icon Vulnrichment

Updated: 2025-07-28T15:09:51.417Z

cve-icon NVD

Status : Deferred

Published: 2025-07-26T08:15:26.160

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6989

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T04:00:10Z

Weaknesses