Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in designingmedia Instant VA instantva allows Path Traversal.This issue affects Instant VA: from n/a through <= 1.0.1.
Published: 2026-03-25
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary File Deletion via Path Traversal
Action: Immediate Patch
AI Analysis

Impact

An attacker can exploit a path traversal flaw in the designingmedia Instant VA theme to delete arbitrary files from the server. The vulnerability allows the theme to resolve file paths outside its intended directory, resulting in the removal of critical website files such as configuration or content files, potentially leading to site downtime or loss of data. The weakness is a classic Path Traversal (CWE‑22) that primarily affects the availability of the affected WordPress site and does not directly grant code execution. The impact is limited to file deletion but can have significant operational consequences. Based on the description, an attacker could craft a request that manipulates the file path to target undesired files.

Affected Systems

The vulnerability affects the designingmedia Instant VA WordPress theme, from the earliest known release through version 1.0.1. All installations running 1.0.1 or any earlier build are potentially vulnerable. The issue does not apply to later versions released after 1.0.1, assuming the patch has been applied.

Risk and Exploitability

The CVSS score of 7.7 classifies the flaw as high severity. The EPSS score of less than 1 % suggests a low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be an HTTP request that provides a crafted file path parameter, so the exploit is web‑based. Though the probability of attack is low, the destructive nature of arbitrary file deletion warrants a prompt response.

Generated by OpenCVE AI on March 26, 2026 at 21:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest version of the Instant VA theme that is newer than 1.0.1 or apply any vendor patch addressing the path traversal flaw.
  • If a newer version is unavailable, limit the theme's file deletion functionality to administrators only or remove the deletion feature completely.
  • Create regular backups of the website files and database to recover from accidental deletions.
  • Set restrictive file permissions on the server, ensuring the web server user cannot delete critical configuration files.
  • Monitor the web server access logs for suspicious file deletion requests and investigate any anomalies promptly.

Generated by OpenCVE AI on March 26, 2026 at 21:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}

cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}


Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Designingmedia
Designingmedia instant Va
Wordpress
Wordpress wordpress
Vendors & Products Designingmedia
Designingmedia instant Va
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in designingmedia Instant VA instantva allows Path Traversal.This issue affects Instant VA: from n/a through <= 1.0.1.
Title WordPress Instant VA theme <= 1.0.1 - Arbitrary File Deletion vulnerability
Weaknesses CWE-22
References

Subscriptions

Designingmedia Instant Va
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:07.234Z

Reserved: 2026-01-28T09:50:41.578Z

Link: CVE-2026-24969

cve-icon Vulnrichment

Updated: 2026-03-26T18:59:39.397Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T17:16:38.803

Modified: 2026-04-23T15:36:56.633

Link: CVE-2026-24969

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:46:23Z

Weaknesses