Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 05 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Muffingroup
Muffingroup betheme Wordpress Wordpress wordpress |
|
| Vendors & Products |
Muffingroup
Muffingroup betheme Wordpress Wordpress wordpress |
Tue, 05 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Betheme theme for WordPress is vulnerable to Arbitrary File Deletion in versions up to, and including, 28.4. This is due to the upload_icons() function workflow using a user-controlled upload path (`mfn-icon-upload`) in a filesystem move operation without constraining it to the uploads directory. This makes it possible for authenticated attackers, with contributor-level access and above, to move/delete arbitrary local files via path traversal. | |
| Title | Betheme <= 28.4 - Authenticated (Contributor+) Arbitrary File Deletion via 'mfn-icon-upload' | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-05-05T14:12:36.587Z
Reserved: 2026-04-14T00:02:04.206Z
Link: CVE-2026-6262
Updated: 2026-05-05T13:49:07.326Z
Status : Deferred
Published: 2026-05-05T12:16:21.590
Modified: 2026-05-05T19:08:20.090
Link: CVE-2026-6262
No data.
OpenCVE Enrichment
Updated: 2026-05-05T13:15:15Z