CVE-2024-12035: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Chimpstudio CS Framework
CVE-2024-12035 is a high-severity path traversal vulnerability in the Chimpstudio CS Framework WordPress plugin, affecting all versions up to 6. 9. It allows authenticated users with Subscriber-level access or higher to delete arbitrary files on the server due to insufficient validation in the cs_widget_file_delete() function. Exploitation requires no user interaction beyond authentication and can lead to remote code execution if critical files like wp-config. php are deleted. The vulnerability has a CVSS score of 8. 8, reflecting its high impact on confidentiality, integrity, and availability. No public exploits are currently known. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent potential server compromise. Countries with significant WordPress usage and large numbers of affected sites are at higher risk.
AI Analysis
Technical Summary
CVE-2024-12035 is a path traversal vulnerability classified under CWE-22, found in the CS Framework plugin for WordPress developed by Chimpstudio. The vulnerability exists in the cs_widget_file_delete() function, which fails to properly validate file paths before deletion. This flaw allows authenticated attackers with as little as Subscriber-level privileges to specify arbitrary file paths outside the intended directory scope, enabling deletion of any file on the server accessible by the web server user. Since WordPress sites often rely on critical configuration files like wp-config.php, deleting such files can disrupt site functionality and enable attackers to gain remote code execution by forcing site administrators to restore or reconfigure the site under attacker control. The vulnerability affects all versions of the plugin up to and including 6.9. The CVSS v3.1 score of 8.8 indicates a high-severity issue with network attack vector, low attack complexity, and no user interaction required beyond authentication. Although no public exploits have been reported yet, the ease of exploitation and potential impact make this a critical risk for affected WordPress installations. The vulnerability was publicly disclosed in March 2025, with no official patch available at the time of reporting, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-12035 is significant for organizations running WordPress sites with the vulnerable CS Framework plugin. Attackers with minimal privileges can delete arbitrary files, potentially leading to site downtime, data loss, and full server compromise through remote code execution. Confidentiality is at risk as attackers could delete or manipulate sensitive configuration files, exposing database credentials or other secrets. Integrity is compromised by unauthorized file deletions, and availability is affected by potential site outages or defacement. The vulnerability could be leveraged to disrupt business operations, damage reputation, and facilitate further attacks such as malware deployment or lateral movement within the network. Given WordPress’s widespread use globally, the threat surface is large, especially for organizations that do not regularly update plugins or enforce strict access controls.
Mitigation Recommendations
To mitigate CVE-2024-12035, organizations should immediately restrict access to the WordPress admin area to trusted users only and review user roles to minimize Subscriber-level privileges where possible. Applying the latest plugin updates from Chimpstudio as soon as they become available is critical. In the absence of an official patch, administrators can implement web application firewall (WAF) rules to detect and block suspicious file deletion requests targeting the cs_widget_file_delete() function. Additionally, hardening the server by restricting file system permissions to prevent the web server user from deleting critical files can reduce impact. Regular backups of WordPress files and databases should be maintained to enable rapid recovery. Monitoring logs for unusual deletion activity and conducting periodic security audits of plugins can help detect exploitation attempts early. Finally, consider disabling or replacing the CS Framework plugin if it is not essential to reduce attack surface.
Affected Countries
United States, India, Germany, United Kingdom, Canada, Australia, Brazil, France, Japan, Netherlands
CVE-2024-12035: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Chimpstudio CS Framework
Description
CVE-2024-12035 is a high-severity path traversal vulnerability in the Chimpstudio CS Framework WordPress plugin, affecting all versions up to 6. 9. It allows authenticated users with Subscriber-level access or higher to delete arbitrary files on the server due to insufficient validation in the cs_widget_file_delete() function. Exploitation requires no user interaction beyond authentication and can lead to remote code execution if critical files like wp-config. php are deleted. The vulnerability has a CVSS score of 8. 8, reflecting its high impact on confidentiality, integrity, and availability. No public exploits are currently known. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent potential server compromise. Countries with significant WordPress usage and large numbers of affected sites are at higher risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-12035 is a path traversal vulnerability classified under CWE-22, found in the CS Framework plugin for WordPress developed by Chimpstudio. The vulnerability exists in the cs_widget_file_delete() function, which fails to properly validate file paths before deletion. This flaw allows authenticated attackers with as little as Subscriber-level privileges to specify arbitrary file paths outside the intended directory scope, enabling deletion of any file on the server accessible by the web server user. Since WordPress sites often rely on critical configuration files like wp-config.php, deleting such files can disrupt site functionality and enable attackers to gain remote code execution by forcing site administrators to restore or reconfigure the site under attacker control. The vulnerability affects all versions of the plugin up to and including 6.9. The CVSS v3.1 score of 8.8 indicates a high-severity issue with network attack vector, low attack complexity, and no user interaction required beyond authentication. Although no public exploits have been reported yet, the ease of exploitation and potential impact make this a critical risk for affected WordPress installations. The vulnerability was publicly disclosed in March 2025, with no official patch available at the time of reporting, increasing the urgency for mitigation.
Potential Impact
The impact of CVE-2024-12035 is significant for organizations running WordPress sites with the vulnerable CS Framework plugin. Attackers with minimal privileges can delete arbitrary files, potentially leading to site downtime, data loss, and full server compromise through remote code execution. Confidentiality is at risk as attackers could delete or manipulate sensitive configuration files, exposing database credentials or other secrets. Integrity is compromised by unauthorized file deletions, and availability is affected by potential site outages or defacement. The vulnerability could be leveraged to disrupt business operations, damage reputation, and facilitate further attacks such as malware deployment or lateral movement within the network. Given WordPress’s widespread use globally, the threat surface is large, especially for organizations that do not regularly update plugins or enforce strict access controls.
Mitigation Recommendations
To mitigate CVE-2024-12035, organizations should immediately restrict access to the WordPress admin area to trusted users only and review user roles to minimize Subscriber-level privileges where possible. Applying the latest plugin updates from Chimpstudio as soon as they become available is critical. In the absence of an official patch, administrators can implement web application firewall (WAF) rules to detect and block suspicious file deletion requests targeting the cs_widget_file_delete() function. Additionally, hardening the server by restricting file system permissions to prevent the web server user from deleting critical files can reduce impact. Regular backups of WordPress files and databases should be maintained to enable rapid recovery. Monitoring logs for unusual deletion activity and conducting periodic security audits of plugins can help detect exploitation attempts early. Finally, consider disabling or replacing the CS Framework plugin if it is not essential to reduce attack surface.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-02T16:38:40.644Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e2bb7ef31ef0b5971be
Added to database: 2/25/2026, 9:48:27 PM
Last enriched: 2/26/2026, 4:42:09 AM
Last updated: 2/26/2026, 6:41:53 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.