CVE-2026-6248
Received Received - Intake
Arbitrary File Deletion in wpForo Plugin Enables Remote Code Execution

Publication date: 2026-04-20

Last updated on: 2026-04-20

Assigner: Wordfence

Description
The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to and including 3.0.5. This is due to two compounding flaws: the Members::update() method does not validate or restrict the value of file-type custom profile fields, allowing authenticated users to store an arbitrary path instead of a legitimate upload path; and the wpforo_fix_upload_dir() sanitization function in ucf_file_delete() only remaps paths that match the expected pattern, and it is passed directly to the unlink() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). Note: The vulnerability requires a file custom field, which requires the wpForo - User Custom Fields addon plugin.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-20
Last Modified
2026-04-20
Generated
2026-05-07
AI Q&A
2026-04-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wpforo forum_plugin to 3.0.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows authenticated users with subscriber-level access and above to delete arbitrary files on the server, potentially leading to remote code execution. Such unauthorized file deletion and possible system compromise can result in breaches of data integrity and availability.

While the provided context does not explicitly mention compliance with standards like GDPR or HIPAA, the ability to delete critical files (e.g., wp-config.php) and execute remote code could lead to unauthorized access or loss of sensitive personal or health data, thereby potentially violating these regulations.


Can you explain this vulnerability to me?

The wpForo Forum plugin for WordPress has a vulnerability in versions up to and including 3.0.5 that allows arbitrary file deletion. This happens because the Members::update() method does not properly validate or restrict file-type custom profile fields, letting authenticated users store arbitrary file paths instead of legitimate upload paths.

Additionally, the wpforo_fix_upload_dir() sanitization function used in ucf_file_delete() only remaps paths matching an expected pattern and then passes them directly to the unlink() function. This combination enables authenticated attackers with subscriber-level access or higher to delete arbitrary files on the server.

This vulnerability requires the presence of a file custom field, which depends on the wpForo - User Custom Fields addon plugin.


How can this vulnerability impact me? :

This vulnerability can have severe impacts because it allows authenticated users to delete arbitrary files on the server hosting the WordPress site.

Deleting critical files such as wp-config.php can lead to remote code execution, potentially giving attackers full control over the website and server.

Since the vulnerability requires only subscriber-level access, it lowers the barrier for attackers to exploit it, increasing the risk of site compromise and data loss.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart