- Description
- The Simple WP Events plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wpe_delete_file AJAX action in all versions up to, and including, 1.8.17. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
- Source
- security@wordfence.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
- Severity
- CRITICAL
- security@wordfence.com
- CWE-73
- Hype score
- Not currently trending
🚨 CVE-2025-2004 ⚠️🔴 CRITICAL (9.1) 🏢 wpminds - Simple WP Events 🏗️ * 🔗 https://t.co/9bPE0g7lR5 🔗 https://t.co/KNXjOpWWOv #CyberCron #VulnAlert #InfoSec https://t.co/GSmW4mISfo
@cybercronai
8 Apr 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-2004 The Simple WP Events plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wpe_delete_file AJAX action in all ve… https://t.co/IC5R45NDTM
@CVEnew
8 Apr 2025
368 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes