Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.1
Perfmatters Plugin for WordPress Allows Attackers to Delete Server Files
CVE-2026-4351
Summary
The Perfmatters plugin for WordPress is insecure, allowing attackers with Subscriber-level access to delete any file on the server. This could cause your website to stop working or behave unexpectedly. Update the plugin to the latest version to fix this issue.
Original title
The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2.5.9. This is due to the `PMCS::action_handler()` method pro...
Original description
The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2.5.9. This is due to the `PMCS::action_handler()` method processing the bulk action `activate`/`deactivate` handlers without any authorization check or nonce verification. The `$_GET['snippets'][]` values are passed unsanitized to `Snippet::activate()`/`Snippet::deactivate()` which call `Snippet::update()` then `file_put_contents()` with the traversed path. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service by corrupting critical files like `.htaccess` or `index.php`.
nvd CVSS3.1
8.1
Vulnerability type
CWE-22
Path Traversal
Published: 10 Apr 2026 · Updated: 10 Apr 2026 · First seen: 10 Apr 2026