CVE-2026-8073
Arbitrary File Deletion in Kirki WordPress Plugin
Publication date: 2026-05-19
Last updated on: 2026-05-19
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| kirki | freeform_page_builder | to 6.0.6 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-23 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to read and delete arbitrary files within the WordPress uploads base directory due to insufficient file path validation and missing capability checks.
Such unauthorized file deletion and potential data exposure could lead to non-compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive data against unauthorized access and modification.
However, the provided information does not explicitly discuss the impact on compliance with these standards.
Can you explain this vulnerability to me?
The Kirki β Freeform Page Builder, Website Builder & Customizer plugin for WordPress has a vulnerability in its 'downloadZIP' function. This vulnerability is due to insufficient validation of file paths and a missing capability check, which allows unauthenticated attackers to read and delete arbitrary files within the WordPress uploads base directory.
How can this vulnerability impact me? :
This vulnerability can allow attackers who are not logged in to delete or read files within the WordPress uploads directory. This could lead to loss of important files or exposure of sensitive data stored in that directory, potentially disrupting website functionality or compromising data confidentiality.