- Description
- The Avatar plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in a function in all versions up to, and including, 0.1.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
- Source
- security@wordfence.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
- Severity
- HIGH
- security@wordfence.com
- CWE-22
- Hype score
- Not currently trending
๐จ CVE-2025-3520 ๐ด HIGH (8.1) ๐ข wonderboymusic - Avatar ๐๏ธ * ๐ https://t.co/dLV71sBerK ๐ https://t.co/ZbsgQu2AFF ๐ https://t.co/HIMCtzuHiK #CyberCron #VulnAlert #InfoSec https://t.co/Sx1hKy7oEH
@cybercronai
18 Apr 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-3520 The Avatar plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in a function in all versions up to, and including, 0.โฆ https://t.co/1FG5RAhaza
@CVEnew
18 Apr 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
๏ฟฝ๏ฟฝ CVE-2025-3520 - WordPress - HIGH ๐จ ๐๏ธ Date published 2025-04-18 02:15:14 UTC #WordPress #CyberSecurity #InfoSec #Vulnerability #TechNews https://t.co/mHdmcoKp2i
@vulns_space
18 Apr 2025
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes