CVE-2026-3464
Arbitrary File Read/Delete in WP Customer Area Plugin Enables RCE
Publication date: 2026-04-17
Last updated on: 2026-04-17
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wp_customer_area | wp_customer_area | to 8.3.4 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can have serious impacts including unauthorized disclosure of sensitive information by reading arbitrary files on the server.
It also allows deletion of arbitrary files, which can disrupt website functionality or enable remote code execution if critical files are deleted.
Overall, it compromises the confidentiality, integrity, and availability of the affected WordPress site.
Can you explain this vulnerability to me?
The WP Customer Area plugin for WordPress has a vulnerability in its 'ajax_attach_file' function due to insufficient file path validation. This flaw exists in all versions up to and including 8.3.4.
Because of this, authenticated users with roles granted access by an administrator (such as Subscribers) can exploit this vulnerability to read or delete arbitrary files on the server.
Reading arbitrary files can expose sensitive information, while deleting certain files (like wp-config.php) can lead to remote code execution.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows authenticated attackers to read and delete arbitrary files on the server, potentially exposing sensitive information stored in those files.
Exposure or deletion of sensitive data can lead to violations of data protection regulations such as GDPR and HIPAA, which require the protection of personal and sensitive information.
Therefore, this vulnerability can negatively impact compliance with these standards by risking unauthorized access to or loss of protected data.