The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file deletion due to lack of restriction on the directory a file can be deleted from in all versions up to, and including, 1.68.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This vulnerability can be paired with CVE-2025-4798 to delete any file within the WordPress root directory.
                
            Metrics
Affected Vendors & Products
References
        History
                    Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Wed, 09 Jul 2025 19:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Wp-downloadmanager Project Wp-downloadmanager Project wp-downloadmanager | |
| CPEs | cpe:2.3:a:wp-downloadmanager_project:wp-downloadmanager:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products | Wp-downloadmanager Project Wp-downloadmanager Project wp-downloadmanager | 
Wed, 11 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Wed, 11 Jun 2025 04:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The WP-DownloadManager plugin for WordPress is vulnerable to arbitrary file deletion due to lack of restriction on the directory a file can be deleted from in all versions up to, and including, 1.68.10. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This vulnerability can be paired with CVE-2025-4798 to delete any file within the WordPress root directory. | |
| Title | WP-DownloadManager <= 1.68.10 - Authenticated (Administrator+) Arbitrary File Deletion | |
| Weaknesses | CWE-36 | |
| References |  | 
 | 
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Wordfence
Published: 2025-06-11T03:41:53.029Z
Updated: 2025-06-11T13:23:50.639Z
Reserved: 2025-05-15T19:37:36.032Z
Link: CVE-2025-4799
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-06-11T13:23:47.521Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-06-11T04:15:59.223
Modified: 2025-07-09T19:11:14.477
Link: CVE-2025-4799
 Redhat
                        Redhat
                    No data.
 ReportizFlow
ReportizFlow