First published: Sat Mar 22 2025(Updated: )
The Export and Import Users and Customers plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the admin_log_page() function in all versions up to, and including, 2.6.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary log files on the server.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WebToffee Import Export WordPress Users | <=2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1972 is classified as a high severity vulnerability due to arbitrary file deletion risks.
To fix CVE-2025-1972, update the WordPress Export and Import Users and Customers plugin to version 2.6.3 or higher.
CVE-2025-1972 affects users of the WordPress Export and Import Users and Customers plugin in versions up to and including 2.6.2.
CVE-2025-1972 is an arbitrary file deletion vulnerability resulting from insufficient file path validation.
No, CVE-2025-1972 requires an authenticated user with administrative privileges to exploit the vulnerability.