Arbitrary File Deletion Vulnerability in LWS Cleaner Plugin for WordPress
CVE-2025-8575

7.2HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
12 September 2025

What is CVE-2025-8575?

The LWS Cleaner plugin, designed for WordPress, has a significant vulnerability that stems from inadequate validation of file paths in its 'lws_cl_delete_file' function. This flaw allows authenticated users, specifically those with Administrator-level access, to delete arbitrary files from the server. Such actions can pose severe consequences, including the potential for remote code execution if critical files, like wp-config.php, are removed. It is crucial for site administrators to address this vulnerability to safeguard their installations.

Affected Version(s)

LWS Cleaner * <= 2.4.1.3

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jonas Benjamin Friedli
.
CVE-2025-8575 : Arbitrary File Deletion Vulnerability in LWS Cleaner Plugin for WordPress