Vulnerability Description
The atec Debug plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation on the 'debug_path' parameter in all versions up to, and including, 1.2.22. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/atec-debug/trunk/includes/ATEC/CONFIG
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new
- https://www.wordfence.com/threat-intel/vulnerabilities/id/170cd2e3-e31b-452e-8c1
FAQ
What is CVE-2025-9518?
CVE-2025-9518 is a vulnerability with a CVSS score of 7.2 (HIGH). The atec Debug plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation on the 'debug_path' parameter in all versions up to, and including, 1.2.22. This m...
How severe is CVE-2025-9518?
CVE-2025-9518 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-9518?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.