The Invelity Product Feeds plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 1.2.6. This is due to missing validation and sanitization in the 'createManageFeedPage' function. This makes it possible for authenticated administrator-level attackers to delete arbitrary files on the server via specially crafted requests that include path traversal sequences, granted they can trick an admin into clicking a malicious link.
Metrics
Affected Vendors & Products
References
History
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Invelity Product Feeds plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 1.2.6. This is due to missing validation and sanitization in the 'createManageFeedPage' function. This makes it possible for authenticated administrator-level attackers to delete arbitrary files on the server via specially crafted requests that include path traversal sequences, granted they can trick an admin into clicking a malicious link. | |
| Title | Invelity Products Feeds <= 1.2.6 - Cross-Site Request Forgery to Arbitrary File Deletion | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-03-21T03:26:55.620Z
Reserved: 2025-12-04T15:10:01.266Z
Link: CVE-2025-14037
No data.
Status : Received
Published: 2026-03-21T04:16:51.263
Modified: 2026-03-21T04:16:51.263
Link: CVE-2025-14037
No data.
OpenCVE Enrichment
No data.