The Avatar plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in a function in all versions up to, and including, 0.1.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Metrics
Affected Vendors & Products
References
History
Fri, 18 Apr 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Avatar plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in a function in all versions up to, and including, 0.1.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
Title | Avatar <= 0.1.4 - Authenticated (Subscriber+) Arbitrary File Deletion | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-04-18T12:01:38.763Z
Reserved: 2025-04-11T14:49:59.710Z
Link: CVE-2025-3520

No data.

Status : Received
Published: 2025-04-18T02:15:14.397
Modified: 2025-04-18T02:15:14.397
Link: CVE-2025-3520

No data.