Impact
The vulnerability originates from insufficient validation of the file path supplied in the ‘delete‑file’ request field within the plugin. An unauthenticated attacker can craft a request that causes the plugin, when an administrator deletes a database entry, to delete any file on the server that the web process can reach. Because critical configuration files such as wp‑config.php may be removed, this can lead to remote code execution or site compromise. The weakness is classified as a path traversal / arbitrary file deletion flaw (CWE‑22).
Affected Systems
Any WordPress installation that has the Extensions For CF7 plugin, versions 3.2.8 or earlier. The vendor, htplugins, released the plugin under the name Extensions For CF7 (Contact form 7 Database, Conditional Fields and Redirection). Sites running these versions that allow administrator deletion of form submissions are vulnerable.
Risk and Exploitability
The CVSS score of 8.1 highlights a high severity, while the EPSS score of less than 1 % indicates that active exploitation is currently rare, but the vulnerability remains a high priority because it does not require authentication and could be leveraged to delete critical files. The flaw is not listed in the CISA KEV catalog. Attackers need only send a crafted delete‑file request to the plugin’s admin endpoint, which is accessible without authentication, allowing them to delete arbitrary files and potentially execute arbitrary code.
OpenCVE Enrichment
EUVD