Meta Box Vulnerability (High) – CVE-2025-14675

Meta Box Vulnerability (High) – CVE-2025-14675

by | Mar 6, 2026 | Plugins

Attack Vectors

Meta Box (slug: meta-box) versions 5.11.1 and earlier contain a High severity vulnerability (CVSS 7.2) identified as CVE-2025-14675. The issue is an authenticated attack, meaning the attacker must already have a valid WordPress account.

The documented risk applies to users with Contributor-level access or higher. In practical terms, this can include internal staff accounts, contractors, agencies, or any compromised user credentials at those roles. An attacker can then attempt to delete server files through the vulnerable behavior described in the plugin’s file-deletion AJAX functionality.

Security Weakness

The vulnerability is caused by insufficient file path validation in the plugin’s ajax_delete_file function. In plain business terms: the plugin does not adequately restrict which files can be deleted, enabling an authenticated user (Contributor+) to delete files beyond what should be permitted.

Because WordPress sites commonly rely on specific files for security and configuration, deleting the “right” file can trigger cascading failures. The disclosed summary notes that deleting a critical file (for example, wp-config.php) can easily lead to remote code execution under the right conditions, which is one of the most severe outcomes for a web property.

Technical or Business Impacts

Operational disruption: Arbitrary file deletion can break core site functionality, cause outages, or force emergency maintenance. For marketing and revenue teams, that can translate into lost leads, interrupted campaigns, and reduced conversion performance during downtime.

Security compromise risk: If file deletion leads to remote code execution as described in the disclosure, attackers may gain the ability to run malicious code on your server. That can enable website defacement, SEO spam, payment or form-data tampering, and the distribution of malware—each carrying reputational damage and potential customer trust impacts.

Compliance and reporting exposure: Depending on what data is processed on the site (contact forms, customer accounts, analytics identifiers, or transactional data), an incident may require internal escalation, legal review, and possible regulatory or contractual notifications. High-severity issues affecting production websites can also create audit findings and third-party risk concerns.

Recommended action: Update Meta Box to version 5.11.2 or a newer patched release, as recommended by the source: Wordfence vulnerability record. Also review who has Contributor+ access and ensure strong password policies and MFA where possible, since this is an authenticated threat.

Similar Attacks

File-handling and access-control issues in web applications and plugins are commonly abused once attackers have valid credentials, particularly when roles like Contributor, Author, or Editor are granted broadly. While each case differs, the pattern—using an allowed feature to reach beyond intended permissions—has appeared in multiple high-profile plugin incidents:

WooCommerce Payments vulnerability abuse (Wordfence coverage) — an example of how attackers operationalize plugin weaknesses to compromise sites at scale.

WP Automatic attacks (Wordfence coverage) — illustrates real-world exploitation patterns where plugin flaws are rapidly targeted to gain control of WordPress environments.

Elementor Pro vulnerability exploitation history (Wordfence coverage) — a reminder that popular plugins can become attractive targets and that patch speed is a key business risk control.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers