PT-2026-31849 · Perfmatters · Perfmatters

Published

2026-04-10

·

Updated

2026-04-10

·

CVE-2026-4351

CVSS v3.1

8.1

High

AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2.5.9. This is due to the PMCS::action handler() method processing the bulk action activate/deactivate handlers without any authorization check or nonce verification. The $ GET['snippets'][] values are passed unsanitized to Snippet::activate()/Snippet::deactivate() which call Snippet::update() then file put contents() with the traversed path. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service by corrupting critical files like .htaccess or index.php.

Fix

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2026-4351

Affected Products

Perfmatters