CVE-2026-1056
Published: 28 January 2026
Description
The Snow Monkey Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'generate_user_dirpath' function in all versions up to, and including, 12.0.3. This makes it possible for unauthenticated attackers to delete…
more
arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely remediation of the path validation flaw in the Snow Monkey Forms plugin to eliminate arbitrary file deletion capability.
Requires robust validation of file paths in inputs to the generate_user_dirpath function, directly countering the path traversal vulnerability.
Facilitates identification of the CVE-2026-1056 vulnerability in WordPress plugins through regular scanning, enabling proactive patching.
Security SummaryAI
CVE-2026-1056 is a critical vulnerability in the Snow Monkey Forms plugin for WordPress, affecting all versions up to and including 12.0.3. It stems from insufficient file path validation in the 'generate_user_dirpath' function, enabling arbitrary file deletion on the server. Rated at CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and mapped to CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), the flaw exposes WordPress sites using this plugin to severe risks.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. By manipulating file paths, they can delete arbitrary files, such as wp-config.php, potentially leading to remote code execution, complete site compromise, data loss, or denial of service.
Mitigation involves updating to a patched version of the Snow Monkey Forms plugin, as indicated by the referenced changeset 3448278 in the WordPress plugin trac. Security advisories from sources like Wordfence detail the issue and recommend immediate upgrades; review the provided code references in Directory.php, View.php, and snow-monkey-forms.php for the exact flaw locations and fixes.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
T1190 directly matches exploitation of a public-facing WordPress plugin vulnerability. T1070.004 enabled by arbitrary file deletion via path traversal.