CVE-2025-11692

5.3 MEDIUM

📋 TL;DR

The Zip Attachments plugin for WordPress has an authorization vulnerability that allows unauthenticated attackers to delete arbitrary files from the WordPress uploads directory. This affects all WordPress sites using Zip Attachments plugin version 1.6 and earlier. Attackers can exploit this without any authentication or special privileges.

💻 Affected Systems

Products:
  • WordPress Zip Attachments plugin
Versions: All versions up to and including 1.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin active. The vulnerability is in the download.php file which is accessible via web requests.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete deletion of all files in wp-content/uploads directory, including critical media files, backups, and uploaded content, potentially causing permanent data loss and site functionality issues.

🟠

Likely Case

Selective deletion of important files like images, documents, or configuration files, leading to broken site functionality and content loss.

🟢

If Mitigated

Minimal impact if proper file permissions and access controls are in place, though some data loss may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted HTTP requests to the vulnerable download.php endpoint. No authentication or special knowledge required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.6

Vendor Advisory: https://plugins.trac.wordpress.org/browser/zip-attachments/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Zip Attachments plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete the plugin immediately.

🔧 Temporary Workarounds

Disable plugin

all

Deactivate the Zip Attachments plugin to prevent exploitation

Block access to download.php

all

Use web server configuration to block access to the vulnerable file

# For Apache: add to .htaccess
<Files "download.php">
    Order Allow,Deny
    Deny from all
</Files>
# For Nginx: add to server block
location ~* /download\.php$ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Deactivate the Zip Attachments plugin immediately
  • Implement strict file permissions on wp-content/uploads directory (755 for directories, 644 for files)

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Zip Attachments version. If version is 1.6 or lower, you are vulnerable.

Check Version:

# From WordPress root directory
grep -r "Version:" wp-content/plugins/zip-attachments/zip-attachments.php | head -1

Verify Fix Applied:

After updating, verify plugin version is higher than 1.6. Test by attempting to access /wp-content/plugins/zip-attachments/download.php - should return 403 or not execute.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200/403 responses to /download.php with DELETE or file manipulation parameters
  • Multiple failed file access attempts in wp-content/uploads directory
  • Unusual file deletion patterns in uploads folder

Network Indicators:

  • HTTP requests to /wp-content/plugins/zip-attachments/download.php with file path parameters
  • Unusual traffic patterns to plugin directory from unauthenticated sources

SIEM Query:

source="web_server_logs" AND (uri_path="/wp-content/plugins/zip-attachments/download.php" OR uri_path CONTAINS "download.php") AND (http_method!="GET" OR parameters CONTAINS "delete" OR parameters CONTAINS "remove")

🔗 References

📤 Share & Export