此页面尚未翻译为您的语言。我们正在努力翻译,目前显示英文内容。
💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.
CVE-2026-3892: Arbitrary File Access in Motors Plugin
平台
wordpress
组件
motors-car-dealership-classified-listings
修复版本
1.4.108
CVE-2026-3892 is an arbitrary file access vulnerability discovered in the Motors – Car Dealership & Classified Listings Plugin for WordPress. This flaw allows authenticated users, even those with subscriber-level access, to delete files on the server. The vulnerability impacts versions 1.0.0 through 1.4.107, and a patch is available in version 1.4.108.
检测此 CVE 是否影响你的项目
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。
影响与攻击场景翻译中…
An attacker exploiting this vulnerability can delete critical system files, potentially leading to a complete compromise of the WordPress installation. This could include deleting configuration files, database connections, or even core WordPress files. The ability to delete arbitrary files grants significant control over the server, enabling attackers to disrupt operations, steal sensitive data, or install malicious code. While requiring authentication, the low privilege level needed (subscriber) expands the potential attack surface significantly, as many WordPress sites have numerous users with this access level.
利用背景翻译中…
This vulnerability was published on 2026-05-14. Currently, there are no known public exploits or active campaigns targeting this specific vulnerability. The ease of exploitation, combined with the widespread use of WordPress and the plugin, suggests it could become a target for opportunistic attackers. Monitor security advisories and threat intelligence feeds for any indications of exploitation.
威胁情报
漏洞利用状态
CISA SSVC
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 低 — 任何有效用户账户均可。
- User Interaction
- 无 — 攻击自动且无声,受害者无需任何操作。
- Scope
- 未改变 — 影响仅限于脆弱组件本身。
- Confidentiality
- 无 — 无机密性影响。
- Integrity
- 高 — 攻击者可写入、修改或删除任何数据。
- Availability
- 高 — 完全崩溃或资源耗尽,完全拒绝服务。
受影响的软件
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
缓解措施和替代方案翻译中…
The primary mitigation is to immediately upgrade the Motors plugin to version 1.4.108 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider restricting file upload permissions for users with subscriber roles. Implement a Web Application Firewall (WAF) rule to block requests containing suspicious file paths in the logo upload parameter. Regularly review user permissions and ensure the principle of least privilege is enforced. After upgrading, confirm the fix by attempting to upload a file with a deliberately invalid path and verifying that the upload fails with an appropriate error message.
修复方法
更新至 1.4.108 版本,或更新的修复版本
常见问题翻译中…
What is CVE-2026-3892 — Arbitrary File Access in Motors Plugin?
CVE-2026-3892 is a HIGH severity vulnerability in the Motors plugin for WordPress, allowing authenticated users to delete arbitrary files on the server due to insufficient file path validation during logo uploads.
Am I affected by CVE-2026-3892 in Motors Plugin?
You are affected if your WordPress site uses the Motors plugin and is running version 1.0.0 through 1.4.107. Check your plugin version immediately.
How do I fix CVE-2026-3892 in Motors Plugin?
Upgrade the Motors plugin to version 1.4.108 or later to resolve the vulnerability. If immediate upgrade is not possible, restrict file upload permissions for subscriber roles and implement WAF rules.
Is CVE-2026-3892 being actively exploited?
As of the publication date, there are no known public exploits or active campaigns targeting CVE-2026-3892, but the vulnerability's ease of exploitation makes it a potential target.
Where can I find the official Motors plugin advisory for CVE-2026-3892?
Refer to the official Motors plugin website or WordPress plugin repository for the latest advisory and update information regarding CVE-2026-3892.
检测此 CVE 是否影响你的项目
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。
立即扫描您的WordPress项目 — 无需账户
上传任何清单文件 (composer.lock, package-lock.json, WordPress 插件列表…) 或粘贴您的组件列表。您立即获得一份漏洞报告。上传文件只是开始:拥有账户后,您将获得持续监控、Slack/电子邮件警报、多项目和白标报告。
拖放您的依赖文件
composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...