CVE-2026-8073
Deferred Deferred - Pending Action
Arbitrary File Deletion in Kirki WordPress Plugin

Publication date: 2026-05-19

Last updated on: 2026-05-19

Assigner: Wordfence

Description
The Kirki – Freeform Page Builder, Website Builder & Customizer plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation and missing capability check in the 'downloadZIP' function in all versions up to, and including, 6.0.6. This makes it possible for unauthenticated attackers to read and delete arbitrary files limited in the WordPress uploads base directory.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-19
Last Modified
2026-05-19
Generated
2026-05-20
AI Q&A
2026-05-20
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
kirki freeform_page_builder to 6.0.6 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-23 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to read and delete arbitrary files within the WordPress uploads base directory due to insufficient file path validation and missing capability checks.

Such unauthorized file deletion and potential data exposure could lead to non-compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive data against unauthorized access and modification.

However, the provided information does not explicitly discuss the impact on compliance with these standards.


Can you explain this vulnerability to me?

The Kirki – Freeform Page Builder, Website Builder & Customizer plugin for WordPress has a vulnerability in its 'downloadZIP' function. This vulnerability is due to insufficient validation of file paths and a missing capability check, which allows unauthenticated attackers to read and delete arbitrary files within the WordPress uploads base directory.


How can this vulnerability impact me? :

This vulnerability can allow attackers who are not logged in to delete or read files within the WordPress uploads directory. This could lead to loss of important files or exposure of sensitive data stored in that directory, potentially disrupting website functionality or compromising data confidentiality.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart