CVE-2025-13320: CWE-73 External Control of File Name or Path in wpusermanager WP User Manager – User Profile Builder & Membership
The WP User Manager plugin for WordPress is vulnerable to Arbitrary File Deletion in all versions up to, and including, 2.9.12. This is due to insufficient validation of user-supplied file paths in the profile update functionality combined with improper handling of array inputs by PHP's filter_input() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server via the 'current_user_avatar' parameter in a two-stage attack which can make remote code execution possible. This only affects sites with the custom avatar setting enabled.
AI Analysis
Technical Summary
CVE-2025-13320 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the WP User Manager plugin for WordPress, specifically in versions up to and including 2.9.12. The flaw stems from insufficient validation of the 'current_user_avatar' parameter, which is used in the profile update functionality. The vulnerability is exacerbated by PHP's filter_input() function improperly handling array inputs, allowing attackers to manipulate file paths. Authenticated users with Subscriber-level privileges or higher can exploit this vulnerability to delete arbitrary files on the web server. The attack is executed in two stages, first manipulating the file path input and then triggering the deletion. This arbitrary file deletion can potentially be leveraged to achieve remote code execution, posing a significant threat to the integrity and availability of the affected systems. The vulnerability only affects sites where the custom avatar setting is enabled, limiting the attack surface. The CVSS v3.1 score is 6.8, indicating a medium severity level, with network attack vector, high attack complexity, low privileges required, no user interaction, and impacts on integrity and availability but not confidentiality. No public exploits have been reported yet, but the risk remains due to the ease of exploitation by authenticated users.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the WP User Manager plugin installed and the custom avatar feature enabled. Successful exploitation can lead to arbitrary file deletion, potentially removing critical files or web application components, causing service disruption and data loss. The possibility of remote code execution elevates the threat, potentially allowing attackers to gain further control over the web server, pivot within the network, or deploy malware. This can impact the integrity and availability of web services, leading to reputational damage, regulatory non-compliance (especially under GDPR if personal data is affected), and financial losses. Organizations relying on WordPress for customer-facing portals, membership sites, or internal applications are particularly vulnerable. The requirement for authenticated access reduces the risk from anonymous attackers but insider threats or compromised accounts increase exposure. The medium severity indicates that while the vulnerability is serious, exploitation requires some conditions to be met, which may limit widespread impact but still demands prompt attention.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WP User Manager plugin and verify if the custom avatar setting is enabled. If enabled, consider disabling this feature until a patch is available. Since no official patch links are currently provided, organizations should monitor vendor communications and security advisories for updates. Implement strict access controls to limit Subscriber-level privileges and enforce strong authentication mechanisms to reduce the risk of account compromise. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious file path manipulations targeting the 'current_user_avatar' parameter. Conduct regular backups of web server files and databases to enable recovery in case of file deletion attacks. Additionally, review PHP configurations and consider hardening filter_input() usage or input validation routines in custom code. Security teams should also monitor logs for unusual file deletion activities and anomalous profile update requests. Finally, educate users about the risks of account compromise and enforce least privilege principles.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-13320: CWE-73 External Control of File Name or Path in wpusermanager WP User Manager – User Profile Builder & Membership
Description
The WP User Manager plugin for WordPress is vulnerable to Arbitrary File Deletion in all versions up to, and including, 2.9.12. This is due to insufficient validation of user-supplied file paths in the profile update functionality combined with improper handling of array inputs by PHP's filter_input() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server via the 'current_user_avatar' parameter in a two-stage attack which can make remote code execution possible. This only affects sites with the custom avatar setting enabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-13320 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the WP User Manager plugin for WordPress, specifically in versions up to and including 2.9.12. The flaw stems from insufficient validation of the 'current_user_avatar' parameter, which is used in the profile update functionality. The vulnerability is exacerbated by PHP's filter_input() function improperly handling array inputs, allowing attackers to manipulate file paths. Authenticated users with Subscriber-level privileges or higher can exploit this vulnerability to delete arbitrary files on the web server. The attack is executed in two stages, first manipulating the file path input and then triggering the deletion. This arbitrary file deletion can potentially be leveraged to achieve remote code execution, posing a significant threat to the integrity and availability of the affected systems. The vulnerability only affects sites where the custom avatar setting is enabled, limiting the attack surface. The CVSS v3.1 score is 6.8, indicating a medium severity level, with network attack vector, high attack complexity, low privileges required, no user interaction, and impacts on integrity and availability but not confidentiality. No public exploits have been reported yet, but the risk remains due to the ease of exploitation by authenticated users.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the WP User Manager plugin installed and the custom avatar feature enabled. Successful exploitation can lead to arbitrary file deletion, potentially removing critical files or web application components, causing service disruption and data loss. The possibility of remote code execution elevates the threat, potentially allowing attackers to gain further control over the web server, pivot within the network, or deploy malware. This can impact the integrity and availability of web services, leading to reputational damage, regulatory non-compliance (especially under GDPR if personal data is affected), and financial losses. Organizations relying on WordPress for customer-facing portals, membership sites, or internal applications are particularly vulnerable. The requirement for authenticated access reduces the risk from anonymous attackers but insider threats or compromised accounts increase exposure. The medium severity indicates that while the vulnerability is serious, exploitation requires some conditions to be met, which may limit widespread impact but still demands prompt attention.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WP User Manager plugin and verify if the custom avatar setting is enabled. If enabled, consider disabling this feature until a patch is available. Since no official patch links are currently provided, organizations should monitor vendor communications and security advisories for updates. Implement strict access controls to limit Subscriber-level privileges and enforce strong authentication mechanisms to reduce the risk of account compromise. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious file path manipulations targeting the 'current_user_avatar' parameter. Conduct regular backups of web server files and databases to enable recovery in case of file deletion attacks. Additionally, review PHP configurations and consider hardening filter_input() usage or input validation routines in custom code. Security teams should also monitor logs for unusual file deletion activities and anomalous profile update requests. Finally, educate users about the risks of account compromise and enforce least privilege principles.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-17T15:48:32.727Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b9182650da22753edbafe
Added to database: 12/12/2025, 3:52:34 AM
Last enriched: 12/12/2025, 4:09:23 AM
Last updated: 12/15/2025, 4:15:53 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14703: Improper Authentication in Shiguangwu sgwbox N3
MediumCVE-2025-14698: Path Traversal in atlaszz AI Photo Team Galleryit App
MediumCVE-2025-14697: Files or Directories Accessible in Shenzhen Sixun Software Sixun Shanghui Group Business Management System
MediumCVE-2025-67907
UnknownCVE-2025-14702: Path Traversal in Smartbit CommV Smartschool App
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.