Description
The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Published: 2026-01-28
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The Snow Monkey Forms plugin for WordPress contains an insufficient file path validation bug in the generate_user_dirpath function. This flaw allows an unauthenticated attacker to delete arbitrary files on the server. Removing critical configuration files such as wp-config.php can lead to the full compromise of the WordPress installation, resulting in remote code execution. The weakness is a classic path traversal scenario (CWE‑22).

Affected Systems

WordPress sites that have the Snow Monkey Forms plugin installed with a version of 12.0.3 or earlier. The vendor is inc2734, and the affected product is the Snow Monkey Forms WordPress plugin. Users should confirm whether their site runs any version up to 12.0.3. If a newer release is installed, the vulnerability has been addressed. No other vendors or products are listed.

Risk and Exploitability

The vulnerability scores a CVSS of 9.8, indicating a critical severity. The EPSS score is reported as < 1%, suggesting that the probability of exploitation in the near future is very low, yet the potential impact is catastrophic. The CVE description states that the path validation is insufficient, allowing arbitrary file deletion for any file the web process can write to. While the description does not explicitly detail the attack path, the code references imply that an unauthenticated HTTP request to the plugin’s REST endpoint could be used to trigger the vulnerable function. Therefore it is inferred that the attacker manipulates the file path to target critical system files via this endpoint. Because the path traversal is unconstrained, the attacker can delete any file for which the web process has write permissions. Monitoring logs for unexpected deletions and applying fixes are essential.

Generated by OpenCVE AI on April 15, 2026 at 21:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Snow Monkey Forms to the latest published version (greater than 12.0.3) or uninstall the plugin if not required.
  • If an upgrade is not immediately possible, disable the REST endpoint that triggers generate_user_dirpath or restrict its access to authenticated administrators only.
  • Configure the web server and file system so that the WordPress user cannot delete critical files such as wp-config.php, wp-config-sample.php, or core WordPress files; use appropriate file permissions (e.g., 644 for files).

Generated by OpenCVE AI on April 15, 2026 at 21:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared 2inc
2inc snow Monkey Forms
Wordpress
Wordpress wordpress
Vendors & Products 2inc
2inc snow Monkey Forms
Wordpress
Wordpress wordpress

Wed, 28 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 12:45:00 +0000

Type Values Removed Values Added
Description The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Title Snow Monkey Forms <= 12.0.3 - Unauthenticated Arbitrary File Deletion via Path Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

2inc Snow Monkey Forms
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:46:24.272Z

Reserved: 2026-01-16T17:27:23.666Z

Link: CVE-2026-1056

cve-icon Vulnrichment

Updated: 2026-01-28T14:57:46.006Z

cve-icon NVD

Status : Deferred

Published: 2026-01-28T13:15:53.480

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:45:14Z

Weaknesses