Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m4q3-832v-44j6 | Meta Box Plugin for WordPress: Authenticated (Contributor+) Arbitrary File Deletion via ajax_delete_file |
Mon, 09 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Metabox
Metabox meta Box Wordpress Wordpress wordpress |
|
| Vendors & Products |
Metabox
Metabox meta Box Wordpress Wordpress wordpress |
Sat, 07 Mar 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_delete_file' function in all versions up to, and including, 5.11.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). | |
| Title | Meta Box <= 5.11.1 - Authenticated (Contributor+) Arbitrary File Deletion | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:32:54.494Z
Reserved: 2025-12-13T16:53:02.153Z
Link: CVE-2025-14675
Updated: 2026-03-09T17:34:24.700Z
Status : Deferred
Published: 2026-03-07T08:16:05.963
Modified: 2026-04-22T21:27:27.950
Link: CVE-2025-14675
No data.
OpenCVE Enrichment
Updated: 2026-04-22T15:30:20Z
Github GHSA