Description
This script is vulnerable to arbitrary file deletion.
This issue allows an attacker to influence calls to the 'unlink()' function and delete arbitrary files. Due to a lack of input validation, an attacker can supply directory traversal sequences followed by an arbitrary file name to delete specific files.
Remediation
Your script should filter metacharacters from user input.
References
Related Vulnerabilities
Rukovoditel Improper Input Validation Vulnerability (CVE-2020-11819)
PHP 4.3.0 file disclosure and possible code execution
PHP HTTP POST incorrect MIME header parsing vulnerability
Python object deserialization of user-supplied data
Jboss EAP Improper Input Validation Vulnerability (CVE-2018-1000873)