Unauthenticated Arbitrary File Deletion Vulnerability in Lit... #1216
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Feature Overview
The Litho WordPress theme (versions ≤ 3.0) includes an AJAX-based “Remove Font Family” feature that allows users to delete custom font folders under
wp-content/uploads/litho-fonts/. This is implemented inlitho_remove_font_family_action_data(), hooked to both authenticated and unauthenticated AJAX actions (wp_ajax_litho_remove_font_family_action_dataandwp_ajax_nopriv_litho_remove_font_family_action_data),...🔧 Technical Details
An unauthenticated AJAX endpoint
litho_remove_font_family_action_dataregistered on bothwp_ajaxandwp_ajax_noprivhooks processes a user-controlledfontfamilystring without sanitization or CSRF/authorization checks. The handler constructs file paths under the uploads directory and invokes the theme��s filesystem API to delete the source directory. By supplying a path traversal payload (e.g., `../../../../wp-config.php`) in the `fontfamily`...🤖 Agent Actions
Added a new subsection to the WordPress exploitation page with:
curlexample for deletingwp-config.php.These changes enrich the existing WordPress Plugin Pentest coverage with a concrete real-world path traversal + file-deletion technique, its exploitation, and secure coding guidance.
✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.