Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13320: CWE-73 External Control of File Name or Path in wpusermanager WP User Manager – User Profile Builder & Membership

0
Medium
VulnerabilityCVE-2025-13320cvecve-2025-13320cwe-73
Published: Fri Dec 12 2025 (12/12/2025, 03:20:51 UTC)
Source: CVE Database V5
Vendor/Project: wpusermanager
Product: WP User Manager – User Profile Builder & Membership

Description

The WP User Manager plugin for WordPress is vulnerable to Arbitrary File Deletion in all versions up to, and including, 2.9.12. This is due to insufficient validation of user-supplied file paths in the profile update functionality combined with improper handling of array inputs by PHP's filter_input() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server via the 'current_user_avatar' parameter in a two-stage attack which can make remote code execution possible. This only affects sites with the custom avatar setting enabled.

AI-Powered Analysis

AILast updated: 12/12/2025, 04:09:23 UTC

Technical Analysis

CVE-2025-13320 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the WP User Manager plugin for WordPress, specifically in versions up to and including 2.9.12. The flaw stems from insufficient validation of the 'current_user_avatar' parameter, which is used in the profile update functionality. The vulnerability is exacerbated by PHP's filter_input() function improperly handling array inputs, allowing attackers to manipulate file paths. Authenticated users with Subscriber-level privileges or higher can exploit this vulnerability to delete arbitrary files on the web server. The attack is executed in two stages, first manipulating the file path input and then triggering the deletion. This arbitrary file deletion can potentially be leveraged to achieve remote code execution, posing a significant threat to the integrity and availability of the affected systems. The vulnerability only affects sites where the custom avatar setting is enabled, limiting the attack surface. The CVSS v3.1 score is 6.8, indicating a medium severity level, with network attack vector, high attack complexity, low privileges required, no user interaction, and impacts on integrity and availability but not confidentiality. No public exploits have been reported yet, but the risk remains due to the ease of exploitation by authenticated users.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites running WordPress with the WP User Manager plugin installed and the custom avatar feature enabled. Successful exploitation can lead to arbitrary file deletion, potentially removing critical files or web application components, causing service disruption and data loss. The possibility of remote code execution elevates the threat, potentially allowing attackers to gain further control over the web server, pivot within the network, or deploy malware. This can impact the integrity and availability of web services, leading to reputational damage, regulatory non-compliance (especially under GDPR if personal data is affected), and financial losses. Organizations relying on WordPress for customer-facing portals, membership sites, or internal applications are particularly vulnerable. The requirement for authenticated access reduces the risk from anonymous attackers but insider threats or compromised accounts increase exposure. The medium severity indicates that while the vulnerability is serious, exploitation requires some conditions to be met, which may limit widespread impact but still demands prompt attention.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the WP User Manager plugin and verify if the custom avatar setting is enabled. If enabled, consider disabling this feature until a patch is available. Since no official patch links are currently provided, organizations should monitor vendor communications and security advisories for updates. Implement strict access controls to limit Subscriber-level privileges and enforce strong authentication mechanisms to reduce the risk of account compromise. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious file path manipulations targeting the 'current_user_avatar' parameter. Conduct regular backups of web server files and databases to enable recovery in case of file deletion attacks. Additionally, review PHP configurations and consider hardening filter_input() usage or input validation routines in custom code. Security teams should also monitor logs for unusual file deletion activities and anomalous profile update requests. Finally, educate users about the risks of account compromise and enforce least privilege principles.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-17T15:48:32.727Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9182650da22753edbafe

Added to database: 12/12/2025, 3:52:34 AM

Last enriched: 12/12/2025, 4:09:23 AM

Last updated: 12/15/2025, 4:15:53 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats