Description
This script is vulnerable to arbitrary file deletion.
This issue allows an attacker to influence calls to the 'unlink()' function and delete arbitrary files. Due to a lack of input validation, an attacker can supply directory traversal sequences followed by an arbitrary file name to delete specific files.
Remediation
Your script should filter metacharacters from user input.
References
Related Vulnerabilities
Joomla! Core 2.5.x Denial of Service (2.5.4 - 2.5.25)
WordPress Plugin WordPress Comments Import & Export CSV Injection (2.0.4)
Ruby on Rails Improper Input Validation Vulnerability (CVE-2014-0082)
Ruby on Rails Improper Input Validation Vulnerability (CVE-2011-3187)
Envoy Proxy Improper Input Validation Vulnerability (CVE-2019-9900)