Description
The Madara - Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wp_manga_delete_zip() function in all versions up to, and including, 2.2.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Published: 2025-07-17
Score: 9.1 Critical
EPSS: 5.0% Low
KEV: No
Impact: Remote Code Execution via unauthenticated arbitrary file deletion
Action: Immediate Patch
AI Analysis

Impact

The Madara - Core plugin for WordPress contains an insufficient file path validation flaw in the wp_manga_delete_zip() function, allowing any user to delete arbitrary files on the server. This vulnerability is a CWE‑22 type path traversal attack that can be leveraged by an unauthenticated attacker to remove critical files such as wp-config.php, potentially leading to remote code execution. The impact is therefore the loss of confidentiality, integrity, and availability of the affected WordPress installation.

Affected Systems

Actors can target any site running the Madara - Core WordPress plugin, all versions from the earliest release up to and including 2.2.3. The affected product is the Madara – Core theme, provided by MangaBooth for WordPress sites.

Risk and Exploitability

The vulnerability has a CVSS score of 9.1 and an EPSS probability of 5 %. It is not listed in the CISA KEV catalog. The flaw can be exploited with unauthenticated HTTP requests to the wp_manga_delete_zip endpoint, without any prior authentication or privileged access. Attackers can trigger the deletion by crafting a specially formed file path, bypassing normal PHP file‑system checks.

Generated by OpenCVE AI on April 20, 2026 at 22:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Madara - Core to version 2.2.4 or later, which removes the insecure wp_manga_delete_zip() function.
  • If an upgrade cannot be performed immediately, block or remove the wp_manga_delete_zip endpoint by disabling that feature through the plugin settings or by adding a rule that rejects requests to that URL.
  • Set restrictive file permissions on critical WordPress files such as wp-config.php (e.g., 440 or 444) so that even if a deletion endpoint is triggered, the web server cannot delete them.

Generated by OpenCVE AI on April 20, 2026 at 22:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21768 The Madara - Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wp_manga_delete_zip() function in all versions up to, and including, 2.2.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
History

Thu, 17 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Jul 2025 03:00:00 +0000

Type Values Removed Values Added
Description The Madara - Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wp_manga_delete_zip() function in all versions up to, and including, 2.2.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Title Madara - Core <= 2.2.3 - Unauthenticated Arbitrary File Deletion
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:34:16.442Z

Reserved: 2025-07-16T14:00:25.831Z

Link: CVE-2025-7712

cve-icon Vulnrichment

Updated: 2025-07-17T14:20:25.652Z

cve-icon NVD

Status : Deferred

Published: 2025-07-17T03:15:26.427

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7712

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:15:06Z

Weaknesses