CVE-2025-8575

HIGH

LWS Cleaner <2.4.1.3 - Privilege Escalation

Title source: llm
STIX 2.1

Description

The LWS Cleaner plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'lws_cl_delete_file' function in all versions up to, and including, 2.4.1.3. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

Scores

CVSS v3 7.2
EPSS 0.0152
EPSS Percentile 81.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-36
Status published
Products (1)
aurelienlws/LWS Cleaner < 2.4.1.3
Published Sep 12, 2025
Tracked Since Feb 18, 2026