CVE-2025-13322: CWE-73 External Control of File Name or Path in husainali52 WP AUDIO GALLERY
The WP AUDIO GALLERY plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in all versions up to, and including, 2.0. This is due to the `wpag_uploadaudio_callback()` AJAX handler not properly validating user-supplied file paths in the `audio_upload` parameter before passing them to `unlink()`. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when critical files like wp-config.php are deleted.
AI Analysis
Technical Summary
CVE-2025-13322 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting the WP AUDIO GALLERY plugin for WordPress, maintained by husainali52. The vulnerability exists in the AJAX handler function wpag_uploadaudio_callback(), which processes the audio_upload parameter without proper validation or sanitization. This parameter is directly passed to the PHP unlink() function, which deletes files on the server. Because the plugin fails to restrict or sanitize the file path input, an authenticated attacker with subscriber-level privileges or higher can craft malicious requests to delete arbitrary files on the server filesystem. Critical files such as wp-config.php, which contains database credentials and configuration, can be targeted. Deletion of such files can disrupt site availability and potentially enable remote code execution if attackers leverage the resulting state to upload malicious code or manipulate site behavior. The vulnerability affects all versions of the plugin up to and including 2.0. The CVSS v3.1 score is 8.1 (high), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and resulting in high impact on integrity and availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild, but the vulnerability’s nature makes it a critical risk for WordPress sites using this plugin.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity and availability of WordPress-based web assets. Organizations relying on the WP AUDIO GALLERY plugin could face unauthorized deletion of critical files, leading to website downtime, data loss, and potential compromise of sensitive configuration data. This could disrupt business operations, damage reputation, and expose organizations to further attacks such as remote code execution or privilege escalation. Given the widespread use of WordPress across Europe for corporate websites, e-commerce, and content management, the impact could be broad. Attackers exploiting this vulnerability could target government, financial, healthcare, and media sectors where WordPress is prevalent, causing service interruptions or data breaches. The requirement for only subscriber-level authentication lowers the barrier for exploitation, increasing risk especially in environments with weak user access controls or compromised credentials.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WP AUDIO GALLERY plugin and verify the version in use. Since no official patch is currently linked, organizations should consider the following mitigations: 1) Temporarily disable or uninstall the WP AUDIO GALLERY plugin until a secure update is released. 2) Restrict user roles and permissions to minimize subscriber-level access, especially on publicly accessible sites. 3) Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting the audio_upload parameter with path traversal or file deletion patterns. 4) Harden file system permissions to prevent the web server user from deleting critical files such as wp-config.php. 5) Monitor server logs for unusual unlink() calls or file deletion activities. 6) Regularly back up WordPress files and databases to enable rapid recovery in case of file deletion. 7) Educate site administrators on the risks of installing unvetted plugins and maintaining least privilege principles. Organizations should track vendor updates and apply official patches promptly once available.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13322: CWE-73 External Control of File Name or Path in husainali52 WP AUDIO GALLERY
Description
The WP AUDIO GALLERY plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in all versions up to, and including, 2.0. This is due to the `wpag_uploadaudio_callback()` AJAX handler not properly validating user-supplied file paths in the `audio_upload` parameter before passing them to `unlink()`. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when critical files like wp-config.php are deleted.
AI-Powered Analysis
Technical Analysis
CVE-2025-13322 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting the WP AUDIO GALLERY plugin for WordPress, maintained by husainali52. The vulnerability exists in the AJAX handler function wpag_uploadaudio_callback(), which processes the audio_upload parameter without proper validation or sanitization. This parameter is directly passed to the PHP unlink() function, which deletes files on the server. Because the plugin fails to restrict or sanitize the file path input, an authenticated attacker with subscriber-level privileges or higher can craft malicious requests to delete arbitrary files on the server filesystem. Critical files such as wp-config.php, which contains database credentials and configuration, can be targeted. Deletion of such files can disrupt site availability and potentially enable remote code execution if attackers leverage the resulting state to upload malicious code or manipulate site behavior. The vulnerability affects all versions of the plugin up to and including 2.0. The CVSS v3.1 score is 8.1 (high), reflecting network attack vector, low attack complexity, requiring privileges but no user interaction, and resulting in high impact on integrity and availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild, but the vulnerability’s nature makes it a critical risk for WordPress sites using this plugin.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the integrity and availability of WordPress-based web assets. Organizations relying on the WP AUDIO GALLERY plugin could face unauthorized deletion of critical files, leading to website downtime, data loss, and potential compromise of sensitive configuration data. This could disrupt business operations, damage reputation, and expose organizations to further attacks such as remote code execution or privilege escalation. Given the widespread use of WordPress across Europe for corporate websites, e-commerce, and content management, the impact could be broad. Attackers exploiting this vulnerability could target government, financial, healthcare, and media sectors where WordPress is prevalent, causing service interruptions or data breaches. The requirement for only subscriber-level authentication lowers the barrier for exploitation, increasing risk especially in environments with weak user access controls or compromised credentials.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the WP AUDIO GALLERY plugin and verify the version in use. Since no official patch is currently linked, organizations should consider the following mitigations: 1) Temporarily disable or uninstall the WP AUDIO GALLERY plugin until a secure update is released. 2) Restrict user roles and permissions to minimize subscriber-level access, especially on publicly accessible sites. 3) Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting the audio_upload parameter with path traversal or file deletion patterns. 4) Harden file system permissions to prevent the web server user from deleting critical files such as wp-config.php. 5) Monitor server logs for unusual unlink() calls or file deletion activities. 6) Regularly back up WordPress files and databases to enable rapid recovery in case of file deletion. 7) Educate site administrators on the risks of installing unvetted plugins and maintaining least privilege principles. Organizations should track vendor updates and apply official patches promptly once available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-17T15:56:27.933Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6920235bcf2d47c38997b878
Added to database: 11/21/2025, 8:31:23 AM
Last enriched: 11/28/2025, 8:49:15 AM
Last updated: 1/7/2026, 4:54:11 AM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.