CVE-2026-4350
Perfmatters · Perfmatters
The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal.
Executive summary
A critical path traversal vulnerability in the Perfmatters plugin could allow an attacker to delete arbitrary files on the WordPress server.
Vulnerability
This vulnerability affects the Perfmatters plugin for WordPress in all versions up to 2. The flaw allows an attacker to perform arbitrary file deletion via path traversal, which could lead to a complete site outage or the removal of critical configuration files.
Business impact
The ability to delete arbitrary files on a server is a catastrophic security failure, often leading to total service disruption. With a CVSS score of 8.1, this vulnerability represents a severe risk to site availability and integrity.
Remediation
Immediate Action: Update the Perfmatters plugin to the latest available version immediately.
Proactive Monitoring: Monitor server file system logs for unauthorized deletion attempts or access to unexpected file paths.
Compensating Controls: If an update is not immediately available, disable the Perfmatters plugin and review file system permissions to ensure the web server user has the least privilege necessary.
Exploitation status
Public Exploit Available: false
Analyst recommendation
WordPress administrators should prioritize updating the Perfmatters plugin. This vulnerability provides a direct vector for destructive actions, making rapid remediation essential to protect the integrity of the web server.