CVE-2025-46439

7.4 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the Vladimir Prelovac Plugin Central WordPress plugin allows attackers to trick authenticated administrators into performing unintended actions, specifically path traversal leading to arbitrary file deletion. This affects WordPress sites using Plugin Central versions up to 2.5.1. Attackers can delete critical files if an admin visits a malicious page while logged in.

💻 Affected Systems

Products:
  • WordPress Plugin: Vladimir Prelovac Plugin Central
Versions: n/a through 2.5.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator authentication and the attacker to trick the admin into clicking a malicious link while logged in.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise through deletion of critical WordPress files (wp-config.php, core files) leading to site unavailability, data loss, or subsequent privilege escalation.

🟠

Likely Case

Partial site disruption through deletion of plugin files, themes, or uploaded content, causing functionality loss or broken site elements.

🟢

If Mitigated

No impact if proper CSRF protections are implemented and administrators avoid suspicious links while authenticated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated administrators. The vulnerability is publicly documented with proof-of-concept details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.2 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/plugin-central/vulnerability/wordpress-plugin-central-plugin-2-5-1-csrf-to-arbitrary-file-deletion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Plugin Central' and check if update is available. 4. Click 'Update Now' to upgrade to version 2.5.2 or later. 5. Verify the plugin version after update.

🔧 Temporary Workarounds

Disable Plugin Central

all

Temporarily deactivate the vulnerable plugin until patched.

wp plugin deactivate plugin-central

Implement CSRF Protection Headers

linux

Add Content Security Policy headers to WordPress to help mitigate CSRF attacks.

Add to .htaccess: Header set Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline';"

🧯 If You Can't Patch

  • Restrict administrator access to trusted networks only and enforce strong authentication.
  • Implement web application firewall (WAF) rules to block path traversal patterns and suspicious POST requests.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Plugin Central' version. If version is 2.5.1 or earlier, it is vulnerable.

Check Version:

wp plugin get plugin-central --field=version

Verify Fix Applied:

After update, verify the plugin version shows 2.5.2 or later in WordPress admin plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in WordPress or web server logs
  • POST requests to plugin-central endpoints with file deletion parameters from unexpected sources

Network Indicators:

  • HTTP POST requests containing path traversal sequences (../) to plugin-central admin endpoints

SIEM Query:

source="wordpress.log" AND "plugin-central" AND ("delete" OR "unlink") AND "../"

🔗 References

📤 Share & Export