CVE-2026-4350
Description
The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the PMCS::action_handler() method processing the $_GET['delete'] parameter without any sanitization, authorization check, or nonce verification. The unsanitized filename is concatenated with the storage directory path and passed to unlink(). This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server by using ../ path traversal sequences, including wp-config.php which would force WordPress into the installation wizard and allow full site takeover.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
3- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 6, 2026 to April 12, 2026)Wordfence Blog · Apr 16, 2026
- Wordfence Intelligence Weekly WordPress Vulnerability Report (March 30, 2026 to April 5, 2026)Wordfence Blog · Apr 9, 2026
- 200,000 WordPress Sites Affected by Arbitrary File Deletion Vulnerability in Perfmatters WordPress PluginWordfence Blog · Apr 2, 2026