CVE-2026-4758
Received Received - Intake
Arbitrary File Deletion in WP Job Portal Plugin Enables RCE

Publication date: 2026-03-26

Last updated on: 2026-03-26

Assigner: Wordfence

Description
The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-26
Last Modified
2026-03-26
Generated
2026-05-07
AI Q&A
2026-03-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wp_job_portal wp_job_portal to 2.4.9 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in the WP Job Portal plugin allows authenticated attackers with Subscriber-level access and above to delete arbitrary files on the server, potentially leading to remote code execution.

Such unauthorized file deletion and possible remote code execution can compromise the confidentiality, integrity, and availability of data stored on the affected server.

This kind of security breach can impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and modification.

Specifically, if personal data governed by GDPR or protected health information under HIPAA is stored or processed on the affected server, this vulnerability could lead to data breaches, unauthorized data alteration, or service disruption, all of which are violations of these regulations.


Can you explain this vulnerability to me?

The WP Job Portal plugin for WordPress contains a vulnerability in the function 'WPJOBPORTALcustomfields::removeFileCustom' present in all versions up to and including 2.4.9. This vulnerability arises from insufficient validation of file paths, allowing authenticated users with Subscriber-level access or higher to delete arbitrary files on the server.

Because the file path is not properly validated, attackers can specify files outside the intended scope to delete. This can lead to deletion of critical files such as 'wp-config.php', which can then be exploited to achieve remote code execution on the server.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized deletion of important files on the server hosting the WordPress site.

  • Authenticated attackers with low-level access (Subscriber or above) can delete arbitrary files.
  • Deletion of critical files like 'wp-config.php' can lead to remote code execution, allowing attackers to run malicious code on the server.
  • Such unauthorized file deletions can disrupt website functionality, cause data loss, and compromise the security and integrity of the server.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability allows authenticated users with Subscriber-level access or higher to delete arbitrary files on the server via the WP Job Portal plugin's 'WPJOBPORTALcustomfields::removeFileCustom' function due to insufficient file path validation.

Detection on your system can involve monitoring for unusual file deletion activities, especially targeting critical files such as wp-config.php or other important server files.

Since the vulnerability requires authenticated access, reviewing WordPress user activity logs for suspicious file deletion requests or unexpected plugin function calls related to WP Job Portal can help detect exploitation attempts.

Specific commands to detect exploitation attempts are not provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update the WP Job Portal plugin to version 2.5.0 or later, where security fixes addressing this issue have been applied.

Restrict or review user permissions to ensure that only trusted users have Subscriber-level or higher access, as the vulnerability requires authenticated access.

Monitor and audit file deletion activities on the server to detect any unauthorized or suspicious deletions.

If an immediate update is not possible, consider temporarily disabling the WP Job Portal plugin to prevent exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart