-
Notifications
You must be signed in to change notification settings - Fork 540
[GHSA-m4q3-832v-44j6] The Meta Box plugin for WordPress is vulnerable to... #7143
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -1,19 +1,43 @@ | ||||||
| { | ||||||
| "schema_version": "1.4.0", | ||||||
| "id": "GHSA-m4q3-832v-44j6", | ||||||
| "modified": "2026-03-07T09:30:14Z", | ||||||
| "modified": "2026-03-07T09:30:21Z", | ||||||
| "published": "2026-03-07T09:30:14Z", | ||||||
| "aliases": [ | ||||||
| "CVE-2025-14675" | ||||||
| ], | ||||||
| "summary": "Meta Box <= 5.11.1 - Authenticated (Contributor+) Arbitrary File Deletion", | ||||||
| "details": "The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_delete_file' function in all versions up to, and including, 5.11.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).", | ||||||
| "severity": [ | ||||||
| { | ||||||
| "type": "CVSS_V3", | ||||||
| "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" | ||||||
| } | ||||||
| ], | ||||||
| "affected": [], | ||||||
| "affected": [ | ||||||
| { | ||||||
| "package": { | ||||||
| "ecosystem": "Packagist", | ||||||
| "name": "wpmetabox/meta-box" | ||||||
|
||||||
| "name": "wpmetabox/meta-box" | |
| "name": "meta-box/meta-box" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The CVSS vector indicates
PR:H(High privileges required), but the details state the attack is possible with "Contributor-level access and above", which is typically not “High” privileges. Update the CVSS vector to match the described privilege requirement (or adjust the details ifPR:His intentional).