PT-2026-31849 · Perfmatters · Perfmatters
Published
2026-04-10
·
Updated
2026-04-10
·
CVE-2026-4351
CVSS v3.1
8.1
High
| AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2.5.9. This is due to the
PMCS::action handler() method processing the bulk action activate/deactivate handlers without any authorization check or nonce verification. The $ GET['snippets'][] values are passed unsanitized to Snippet::activate()/Snippet::deactivate() which call Snippet::update() then file put contents() with the traversed path. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service by corrupting critical files like .htaccess or index.php.Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Perfmatters