The LWS Cleaner plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'lws_cl_delete_file' function in all versions up to, and including, 2.4.1.3. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
Metrics
Affected Vendors & Products
References
History
Mon, 15 Sep 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lws
Lws lws Cleaner Wordpress Wordpress wordpress |
|
Vendors & Products |
Lws
Lws lws Cleaner Wordpress Wordpress wordpress |
Fri, 12 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 12 Sep 2025 05:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The LWS Cleaner plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'lws_cl_delete_file' function in all versions up to, and including, 2.4.1.3. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
Title | LWS Cleaner <= 2.4.1.3 - Authenticated (Administrator+) Arbitrary File Deletion via 'lws_cl_delete_file' | |
Weaknesses | CWE-36 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-09-12T16:30:45.507Z
Reserved: 2025-08-05T00:23:10.299Z
Link: CVE-2025-8575

Updated: 2025-09-12T16:30:41.037Z

Status : Awaiting Analysis
Published: 2025-09-12T06:15:43.810
Modified: 2025-09-15T15:21:42.937
Link: CVE-2025-8575

No data.

Updated: 2025-09-15T10:43:59Z