The SMSA Shipping(official) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the smsa_delete_label() function in all versions up to, and including, 2.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). CVE-2024-49249 is likely a duplicate of this issue.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The SMSA Shipping(official) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the smsa_delete_label() function in all versions up to, and including, 2.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | The SMSA Shipping(official) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the smsa_delete_label() function in all versions up to, and including, 2.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). CVE-2024-49249 is likely a duplicate of this issue. |
| Title | SMSA Shipping(official) <= 2.2 - Authenticated (Subscriber+) Arbitrary File Deletion | SMSA Shipping(official) <= 2.3 - Authenticated (Subscriber+) Arbitrary File Deletion |
| References |
|
Sat, 28 Dec 2024 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 21 Dec 2024 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The SMSA Shipping(official) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the smsa_delete_label() function in all versions up to, and including, 2.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
| Title | SMSA Shipping(official) <= 2.2 - Authenticated (Subscriber+) Arbitrary File Deletion | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:43:23.471Z
Reserved: 2024-12-02T21:25:42.797Z
Link: CVE-2024-12066
Updated: 2024-12-23T16:42:21.082Z
Status : Awaiting Analysis
Published: 2024-12-21T07:15:08.907
Modified: 2026-04-08T17:17:49.723
Link: CVE-2024-12066
No data.
OpenCVE Enrichment
Updated: 2025-07-13T11:14:34Z