The atec Debug plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation on the 'debug_path' parameter in all versions up to, and including, 1.2.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Metrics
Affected Vendors & Products
References
History
Thu, 04 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 04 Sep 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Thu, 04 Sep 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The atec Debug plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation on the 'debug_path' parameter in all versions up to, and including, 1.2.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
| Title | atec Debug <= 1.2.22 - Authenticated (Administrator+) Arbitrary File Deletion | |
| Weaknesses | CWE-36 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-09-04T04:23:47.557Z
Updated: 2025-09-04T17:20:07.540Z
Reserved: 2025-08-26T23:18:49.599Z
Link: CVE-2025-9518
Updated: 2025-09-04T17:19:59.625Z
Status : Awaiting Analysis
Published: 2025-09-04T10:42:35.410
Modified: 2025-09-04T15:35:29.497
Link: CVE-2025-9518
No data.