The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_associated_files function in all versions up to, and including, 3.2.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Metrics
Affected Vendors & Products
References
History
Wed, 20 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 20 Aug 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_associated_files function in all versions up to, and including, 3.2.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
Title | Redirection for Contact Form 7 <= 3.2.4 - Unauthenticated Arbitrary File Deletion | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-20T01:44:36.793Z
Updated: 2025-08-20T15:15:16.516Z
Reserved: 2025-07-24T16:21:17.311Z
Link: CVE-2025-8141

Updated: 2025-08-20T13:56:58.249Z

Status : Awaiting Analysis
Published: 2025-08-20T03:15:35.640
Modified: 2025-08-20T14:39:07.860
Link: CVE-2025-8141

No data.