Impact
The Betheme theme includes a flaw in the upload_icons() workflow that allows an authenticated WordPress user with contributor-level access or higher to specify a custom upload path (mfn-icon-upload) that bypasses directory restrictions, leading to arbitrary deletion of local files via a filesystem move operation. This results in loss of data, site disruption, and potential exposure of critical files, representing a file deletion vulnerability (CWE-22).
Affected Systems
MuffinGroup Betheme theme for WordPress, versions 28.4 and earlier. Any site using these versions is susceptible.
Risk and Exploitability
The severity score of 6.5 indicates moderate risk. Explicitly, the exploit relies on authentication. An attacker who can log in with contributor privileges can conduct the deletion by submitting a crafted upload request through the theme's admin interface, using the mfn-icon-upload path. The EPSS score is unavailable and the vulnerability is not listed in CISA KEV, but the lack of public exploitation does not eliminate risk if the user base still uses vulnerable versions.
OpenCVE Enrichment