CVE-2025-12092
Description
The CYAN Backup plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete' functionality in all versions up to, and including, 2.5.4. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated administrators can delete arbitrary files via insufficient path validation in CYAN Backup plugin up to v2.5.4.
Vulnerability
Overview
The CYAN Backup plugin for WordPress, in all versions up to and including 2.5.4, contains an arbitrary file deletion vulnerability. The root cause is insufficient validation of the file path supplied to the 'delete' functionality. The plugin's code did not verify that the file being deleted was actually a backup file, allowing an attacker to specify any file path on the server [1].
Exploitation
Details
To exploit this vulnerability, an attacker must have Administrator-level access or higher to the WordPress site. The attack is performed via the plugin's admin interface, where the 'remove' parameter is processed. The original code used realpath() function resolves the path, but the subsequent check only verified that the file exists, not that it is a legitimate backup file. The commit diff shows that the fix adds a fix was introduced to iterate over known backup files and confirm the target is among them before deletion [1].
Impact
Successful exploitation allows an authenticated administrator to delete arbitrary files on the server. This can lead to severe consequences, such as deleting the wp-config.php file, which would break the site and potentially enable remote code execution if the attacker can then upload a new configuration or exploit the resulting state [1].
Mitigation
The vulnerability has been patched in commit 4a79d23e8ba330b5cb655a083c6a00ef32a7b32a7b249, which adds a check to ensure only files that are part of the backup set can be deleted. Users are strongly advised to update the CYAN Backup plugin to a version that includes this fix. No workaround is provided, and given the high impact, immediate updating is recommended [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
22.4, 2.5, 2.5.1, …+ 1 more
- (no CPE)range: 2.4, 2.5, 2.5.1, …
- (no CPE)range: <=2.5.4
Patches
14a79d23e8ba3Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.