CVE-2025-12092

Source
https://cve.org/CVERecord?id=CVE-2025-12092
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-12092.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-12092
Published
2025-11-08T10:15:41.143Z
Modified
2026-03-14T12:41:21.678643Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

The CYAN Backup plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete' functionality in all versions up to, and including, 2.5.4. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

References

Affected packages

Git / github.com/toolstack/cyan-backup

Affected ranges

Type
GIT
Repo
https://github.com/toolstack/cyan-backup
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2.*
2.4
2.5
2.5.1
2.5.2
2.5.3
2.5.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-12092.json"