
Cloud Vulnerability DB
A community-led vulnerabilities database
The LWS Cleaner WordPress plugin contains an arbitrary file deletion vulnerability (CVE-2025-8575) in versions up to and including 2.4.1.3. The vulnerability exists in the 'lwscldelete_file' function due to insufficient file path validation (NVD). The issue was discovered and disclosed on September 12, 2025.
The vulnerability is classified as an Absolute Path Traversal (CWE-36) with a CVSS v3.1 base score of 7.2 (High). The attack vector is network-based (AV:N) with low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H) (NVD).
If exploited, the vulnerability allows authenticated attackers with Administrator-level access to delete arbitrary files on the server. This capability could lead to remote code execution when critical files, such as wp-config.php, are deleted (NVD).
The vulnerability has been addressed in version 2.4.2 of the LWS Cleaner plugin, which completely removes the Files tab functionality due to security concerns. Users should update to this version immediately (WordPress Changeset).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."