CWE-73: CWE-73
Yearly Trend
Top Affected Vendors
All CWE-73 CVEs (148)
The Wptobe-memberships WordPress plugin contains an arbitrary file deletion vulnerability in the del_img_ajax_call() function. Authenticated attackers...
Aug 23, 2025The SureForms WordPress plugin has an arbitrary file deletion vulnerability that allows unauthenticated attackers to delete any file on the server. Th...
Jul 9, 2025This vulnerability in Apache Parquet's parquet-avro module allows attackers to execute arbitrary code by exploiting schema parsing when reading malici...
May 6, 2025This vulnerability in the WP Delicious Recipe Plugin allows authenticated attackers with subscriber-level access or higher to move and read arbitrary ...
Sep 11, 2024This vulnerability allows attackers to bypass security features in Windows HTML platforms, potentially enabling malicious code execution or privilege ...
Jan 9, 2024This vulnerability allows attackers to control file paths in FlatPress blog software, potentially leading to arbitrary file read or write operations. ...
Mar 1, 2023This vulnerability in Windows Telephony Service allows an authorized attacker on the same network to manipulate file paths, potentially leading to pri...
Jan 13, 2026This vulnerability allows an authorized attacker to control file names or paths in .NET, Visual Studio, and Build Tools for Visual Studio, enabling ne...
May 13, 2025This vulnerability in QNAP HBS 3 Hybrid Backup Sync allows attackers with local network access to manipulate file paths, potentially reading or modify...
Jan 2, 2026This vulnerability allows an authenticated attacker to exploit a missing authentication check in the Windows Storage VSP Driver to gain elevated local...
Dec 9, 2025This vulnerability in Windows WLAN Service allows an authenticated attacker to manipulate file paths, potentially leading to local privilege escalatio...
Nov 11, 2025This vulnerability allows a malicious local attacker to control file paths in Edgecross Basic Software, potentially leading to arbitrary code executio...
Dec 19, 2024This vulnerability in Cisco Crosswork NSO's Tail-f HCC function pack allows authenticated local attackers to escalate privileges to root by manipulati...
May 15, 2024This vulnerability allows attackers to execute malicious code by tricking legitimate users into opening specially crafted project files in Mitsubishi ...
Nov 30, 2023CVE-2023-21566 is an elevation of privilege vulnerability in Visual Studio that allows authenticated attackers to execute arbitrary code with SYSTEM p...
Feb 14, 2023A high-privileged user in Infoblox NIOS can exploit the account creation mechanism to write arbitrary files to the system. This affects Infoblox NIOS ...
Feb 12, 2026The Kafka Connect BigQuery Connector prior to version 2.11.0 has an arbitrary file read vulnerability in credential configuration processing. Attacker...
Jan 16, 2026This vulnerability in Wazuh Agent allows authenticated attackers to force NTLM authentication through malicious UNC paths in agent configuration setti...
Nov 21, 2025CVE-2025-62382 is a path traversal vulnerability in Frigate NVR that allows authenticated users to read arbitrary files on the host system. Attackers ...
Oct 15, 2025This vulnerability in Veritas Backup Exec allows attackers to delete arbitrary protected files by exploiting the Deduplication Multi-threaded Streamin...
Apr 26, 2024The Zoom VDI client installer prior to version 5.14.0 contains an improper access control vulnerability that allows a malicious user to delete local f...
Jun 13, 2023This vulnerability allows remote attackers to read arbitrary local files on systems running vulnerable Keras versions by exploiting a flaw in the HDF5...
Feb 11, 2026NodeBB Plugin Emoji 3.2.1 contains an arbitrary file write vulnerability that allows administrative users to write files to arbitrary system locations...
Jan 21, 2026This vulnerability allows unauthenticated attackers to read arbitrary files on WordPress servers running the Auto Amazon Links plugin. Attackers can a...
Nov 11, 2025This vulnerability allows remote attackers to delete arbitrary files on the Soar Cloud HRD Human Resource Management System by manipulating file paths...
Jun 6, 2025This vulnerability allows remote attackers to read arbitrary files from the Soar Cloud HRD Human Resource Management System by manipulating file paths...
Jun 6, 2025The CLEVER HTML5 Radio Player WordPress plugin contains an arbitrary file read vulnerability that allows unauthenticated attackers to read any file on...
Apr 19, 2025This vulnerability allows unauthenticated attackers to read arbitrary files on WordPress servers running the ZoomSounds plugin. Attackers can access s...
Apr 8, 2025The CS Framework plugin for WordPress has an arbitrary file read vulnerability that allows authenticated attackers with subscriber-level access or hig...
Mar 7, 2025A local file inclusion vulnerability in ArcGIS Server 11.3 and earlier allows remote unauthenticated attackers to read sensitive configuration files b...
Mar 3, 2025This vulnerability in Microsoft's OpenSSH for Windows allows remote attackers to execute arbitrary code on affected systems. Attackers can exploit thi...
Oct 8, 2024A local file inclusion vulnerability in Esri Portal for ArcGIS allows remote unauthenticated attackers to craft URLs that read internal files, potenti...
Oct 4, 2024CVE-2024-30265 is a local file inclusion vulnerability in Voilà dashboard deployments that allows attackers to download any file readable by the serv...
Apr 3, 2024CVE-2024-1603 is a path traversal vulnerability in PaddlePaddle's read_file function that allows attackers to read arbitrary files from the server fil...
Mar 23, 2024This vulnerability allows attackers to read arbitrary files on WWBN AVideo servers by exploiting improper input validation in the image404Raw.php scri...
Jan 10, 2024CVE-2021-3845 is a path traversal vulnerability in ws-scrcpy that allows attackers to write files to arbitrary locations on the server filesystem. Thi...
Jan 4, 2022Campcodes Payroll Management System 1.0 contains a remote file inclusion vulnerability in the /index.php file's include function. Attackers can manipu...
Aug 27, 2025CVE-2023-3643 is a critical file inclusion vulnerability in Boss Mini 1.4.0 Build 6221 that allows remote attackers to manipulate the 'path' argument ...
Jul 12, 2023HkCms v2.3.2.240702 contains an arbitrary file write vulnerability in Appcenter.php that allows attackers to write malicious files to the server. This...
Feb 27, 2025Authenticated technician users in GLPI can upload malicious PHP scripts and hijack the plugin loader to execute arbitrary code. This affects GLPI inst...
Jul 10, 2024This vulnerability allows authenticated administrators in Aimeos e-commerce framework to upload malicious files disguised as images that contain PHP c...
Jun 11, 2024This vulnerability in RUGGEDCOM CROSSBOW allows privileged users to upload files to the root installation directory via the bulk import feature. Attac...
May 14, 2024This vulnerability in RUGGEDCOM CROSSBOW allows privileged users to upload arbitrary files to the system's root installation directory. By replacing s...
May 14, 2024This vulnerability allows attackers to control file paths in the bumsys software, potentially leading to arbitrary file read, write, or deletion. It a...
May 5, 2023OpenClaw versions before 2026.2.12 have an arbitrary file write vulnerability where authenticated gateway clients can manipulate the sessionFile path ...
Mar 5, 2026This vulnerability in Microsoft OpenSSH for Windows allows remote attackers to execute arbitrary code on affected systems. Attackers could exploit thi...
Oct 8, 2024This vulnerability in FortiAP-U's command line interpreter allows authenticated attackers to bypass file path filtering and delete or list arbitrary f...
Sep 13, 2023A path traversal vulnerability in BusyBox's archive extraction utilities allows attackers to create malicious archives that, when extracted under spec...
Feb 11, 2026The WP User Manager WordPress plugin has an arbitrary file deletion vulnerability that allows authenticated attackers with Subscriber-level access or ...
Dec 12, 2025This vulnerability in Pebble Templates allows attackers with template editing privileges to read sensitive local files through the include tag. It aff...
Feb 27, 2025About CWE-73 (CWE-73)
Our database tracks 148 CVEs classified as CWE-73, with 26 rated critical and 72 rated high severity. The average CVSS score for CWE-73 vulnerabilities is 7.5.
External reference: View CWE-73 on MITRE CWE →
Monitor CWE-73 Vulnerabilities
Get alerted when new CWE-73 CVEs affect your infrastructure.
Start Monitoring Free