Cyber Posture

CVE-2026-4350

High

Published: 03 April 2026

Published
03 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0004 13.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may delete files left behind by the actions of their intrusion activity.

Security Summary

CVE-2026-4350 is a path traversal vulnerability in the Perfmatters plugin for WordPress, affecting all versions up to and including 2.5.9.1. The issue resides in the PMCS::action_handler() method, which processes the unsanitized $_GET['delete'] parameter without authorization checks or nonce verification. This allows the parameter value to be directly concatenated with the plugin's storage directory path and passed to PHP's unlink() function, enabling arbitrary file deletion (CWE-22). The vulnerability has a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H).

Authenticated attackers with Subscriber-level access or higher can exploit this vulnerability remotely over the network with low complexity. By crafting a GET request with a 'delete' parameter containing path traversal sequences like '../', they can target and delete any server-accessible file. A critical outcome is deletion of wp-config.php, which disrupts WordPress functionality and forces the site into the installation wizard, potentially allowing full site takeover if the attacker can subsequently reconfigure the site.

Mitigation details are available in advisories from Wordfence and the Perfmatters changelog. Security practitioners should update to a patched version of the plugin beyond 2.5.9.1 and review the referenced sources for specific remediation steps: https://perfmatters.io/docs/changelog/ and https://www.wordfence.com/threat-intel/vulnerabilities/id/58b9dab8-8539-4b53-b08d-f6ee3e1e744c?source=cve.

Details

CWE(s)
CWE-22

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

Path traversal in WordPress plugin enables exploitation of public-facing application (T1190) for arbitrary file deletion (T1107), disrupting site functionality.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References