πŸ” CVE Alert

CVE-2026-4350

HIGH 8.1

Perfmatters <= 2.5.9.1 - Authenticated (Subscriber+) Arbitrary File Deletion via 'delete' Parameter

CVSS Score
8.1
EPSS Score
0.1%
EPSS Percentile
28th

The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the `PMCS::action_handler()` method processing the `$_GET['delete']` parameter without any sanitization, authorization check, or nonce verification. The unsanitized filename is concatenated with the storage directory path and passed to `unlink()`. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server by using `../` path traversal sequences, including `wp-config.php` which would force WordPress into the installation wizard and allow full site takeover.

CWE CWE-22
Vendor perfmatters
Product perfmatters
Published Apr 3, 2026
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for perfmatters perfmatters

Be the first to know when new high vulnerabilities affecting perfmatters perfmatters are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

perfmatters / Perfmatters
0 ≀ 2.5.9.1

References

NVD β†— CVE.org β†— EPSS Data β†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/58b9dab8-8539-4b53-b08d-f6ee3e1e744c?source=cve perfmatters.io: https://perfmatters.io/docs/changelog/

Credits

PhΓΊ