vulnerability

WordPress Plugin: groundhogg: CVE-2025-4206: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Severity
8
CVSS
(AV:N/AC:L/Au:M/C:C/I:C/A:C)
Published
May 8, 2025
Added
May 15, 2025
Modified
Jun 24, 2025

Description

The WordPress CRM, Email and Marketing Automation for WordPress | Award Winner — Groundhogg plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'process_export_delete' and 'process_import_delete' functions in all versions up to, and including, 4.1.1.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

Solution

groundhogg-plugin-cve-2025-4206
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.