Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Invelity
Invelity invelity Product Feeds Wordpress Wordpress wordpress |
|
| Vendors & Products |
Invelity
Invelity invelity Product Feeds Wordpress Wordpress wordpress |
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Invelity Product Feeds plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 1.2.6. This is due to missing validation and sanitization in the 'createManageFeedPage' function. This makes it possible for authenticated administrator-level attackers to delete arbitrary files on the server via specially crafted requests that include path traversal sequences, granted they can trick an admin into clicking a malicious link. | |
| Title | Invelity Products Feeds <= 1.2.6 - Cross-Site Request Forgery to Arbitrary File Deletion | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-03-24T13:52:05.105Z
Reserved: 2025-12-04T15:10:01.266Z
Link: CVE-2025-14037
Updated: 2026-03-24T13:51:59.657Z
Status : Awaiting Analysis
Published: 2026-03-21T04:16:51.263
Modified: 2026-03-23T14:32:02.800
Link: CVE-2025-14037
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:50:14Z