Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12035: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Chimpstudio CS Framework

0
High
VulnerabilityCVE-2024-12035cvecve-2024-12035cwe-22
Published: Fri Mar 07 2025 (03/07/2025, 08:21:21 UTC)
Source: CVE Database V5
Vendor/Project: Chimpstudio
Product: CS Framework

Description

CVE-2024-12035 is a high-severity path traversal vulnerability in the Chimpstudio CS Framework WordPress plugin, affecting all versions up to 6. 9. It allows authenticated users with Subscriber-level access or higher to delete arbitrary files on the server due to insufficient validation in the cs_widget_file_delete() function. Exploitation requires no user interaction beyond authentication and can lead to remote code execution if critical files like wp-config. php are deleted. The vulnerability has a CVSS score of 8. 8, reflecting its high impact on confidentiality, integrity, and availability. No public exploits are currently known. Organizations using this plugin should prioritize patching or mitigating this flaw to prevent potential server compromise. Countries with significant WordPress usage and large numbers of affected sites are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:42:09 UTC

Technical Analysis

CVE-2024-12035 is a path traversal vulnerability classified under CWE-22, found in the CS Framework plugin for WordPress developed by Chimpstudio. The vulnerability exists in the cs_widget_file_delete() function, which fails to properly validate file paths before deletion. This flaw allows authenticated attackers with as little as Subscriber-level privileges to specify arbitrary file paths outside the intended directory scope, enabling deletion of any file on the server accessible by the web server user. Since WordPress sites often rely on critical configuration files like wp-config.php, deleting such files can disrupt site functionality and enable attackers to gain remote code execution by forcing site administrators to restore or reconfigure the site under attacker control. The vulnerability affects all versions of the plugin up to and including 6.9. The CVSS v3.1 score of 8.8 indicates a high-severity issue with network attack vector, low attack complexity, and no user interaction required beyond authentication. Although no public exploits have been reported yet, the ease of exploitation and potential impact make this a critical risk for affected WordPress installations. The vulnerability was publicly disclosed in March 2025, with no official patch available at the time of reporting, increasing the urgency for mitigation.

Potential Impact

The impact of CVE-2024-12035 is significant for organizations running WordPress sites with the vulnerable CS Framework plugin. Attackers with minimal privileges can delete arbitrary files, potentially leading to site downtime, data loss, and full server compromise through remote code execution. Confidentiality is at risk as attackers could delete or manipulate sensitive configuration files, exposing database credentials or other secrets. Integrity is compromised by unauthorized file deletions, and availability is affected by potential site outages or defacement. The vulnerability could be leveraged to disrupt business operations, damage reputation, and facilitate further attacks such as malware deployment or lateral movement within the network. Given WordPress’s widespread use globally, the threat surface is large, especially for organizations that do not regularly update plugins or enforce strict access controls.

Mitigation Recommendations

To mitigate CVE-2024-12035, organizations should immediately restrict access to the WordPress admin area to trusted users only and review user roles to minimize Subscriber-level privileges where possible. Applying the latest plugin updates from Chimpstudio as soon as they become available is critical. In the absence of an official patch, administrators can implement web application firewall (WAF) rules to detect and block suspicious file deletion requests targeting the cs_widget_file_delete() function. Additionally, hardening the server by restricting file system permissions to prevent the web server user from deleting critical files can reduce impact. Regular backups of WordPress files and databases should be maintained to enable rapid recovery. Monitoring logs for unusual deletion activity and conducting periodic security audits of plugins can help detect exploitation attempts early. Finally, consider disabling or replacing the CS Framework plugin if it is not essential to reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-02T16:38:40.644Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e2bb7ef31ef0b5971be

Added to database: 2/25/2026, 9:48:27 PM

Last enriched: 2/26/2026, 4:42:09 AM

Last updated: 2/26/2026, 6:41:53 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats