Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13681: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in thebaldfatguy BFG Tools – Extension Zipper

0
Medium
VulnerabilityCVE-2025-13681cvecve-2025-13681cwe-22
Published: Sat Feb 14 2026 (02/14/2026, 03:25:26 UTC)
Source: CVE Database V5
Vendor/Project: thebaldfatguy
Product: BFG Tools – Extension Zipper

Description

The BFG Tools – Extension Zipper plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.0.7. This is due to insufficient input validation on the user-supplied `first_file` parameter in the `zip()` function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files and directories outside the intended `/wp-content/plugins/` directory, which can contain sensitive information such as wp-config.php.

AI-Powered Analysis

AILast updated: 02/14/2026, 06:38:22 UTC

Technical Analysis

CVE-2025-13681 identifies a path traversal vulnerability in the BFG Tools – Extension Zipper plugin for WordPress, present in all versions up to and including 1.0.7. The root cause is insufficient validation of the user-supplied 'first_file' parameter within the zip() function, which is responsible for packaging files into a zip archive. Because the plugin fails to properly sanitize this input, an authenticated attacker with Administrator-level privileges or higher can manipulate the parameter to traverse directories outside the intended '/wp-content/plugins/' folder. This enables reading arbitrary files on the server filesystem, including sensitive files like wp-config.php that contain database credentials and other critical configuration details. The vulnerability impacts confidentiality but does not affect integrity or availability. The CVSS 3.1 base score is 4.9 (medium), reflecting the requirement for high privileges (PR:H), network attack vector (AV:N), no user interaction (UI:N), and high confidentiality impact (C:H). No known exploits have been reported in the wild as of the publication date. The vulnerability is significant in environments where the plugin is installed and administrators might be compromised or malicious. Since WordPress is widely used across Europe for websites and e-commerce, this vulnerability poses a risk of sensitive data leakage if exploited. The lack of a patch at the time of reporting necessitates immediate mitigation steps to reduce exposure.

Potential Impact

For European organizations, this vulnerability primarily threatens the confidentiality of sensitive data stored on WordPress servers using the affected plugin. Exposure of wp-config.php or other configuration files can lead to further compromise, such as database access or lateral movement within the network. Organizations in sectors with strict data protection regulations (e.g., GDPR) face compliance risks if sensitive customer or internal data is leaked. The requirement for Administrator-level access limits the attack surface to insiders or attackers who have already compromised an admin account, but insider threats or credential theft are common attack vectors. The vulnerability could be leveraged in targeted attacks against government, financial, or e-commerce websites prevalent in Europe, potentially leading to data breaches or espionage. The medium severity score reflects moderate risk, but the strategic importance of affected systems elevates the need for prompt remediation. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as exploit code could emerge.

Mitigation Recommendations

1. Immediately restrict Administrator-level access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2. Monitor and audit WordPress admin accounts for suspicious activity to detect potential misuse. 3. Disable or uninstall the BFG Tools – Extension Zipper plugin if it is not essential to operations until a patched version is released. 4. If the plugin is required, implement web application firewall (WAF) rules to detect and block path traversal patterns in requests targeting the 'first_file' parameter. 5. Regularly back up WordPress site data and configuration files securely to enable recovery in case of compromise. 6. Keep WordPress core and all plugins updated; apply patches promptly once available for this vulnerability. 7. Conduct internal security training to raise awareness about the risks of elevated privileges and the importance of secure plugin management. 8. Employ file integrity monitoring on critical files like wp-config.php to detect unauthorized access or changes. 9. Limit file system permissions for the web server user to minimize access outside necessary directories. 10. Review and harden server and WordPress configurations to reduce the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T18:54:26.188Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69901846c9e1ff5ad867f1be

Added to database: 2/14/2026, 6:37:58 AM

Last enriched: 2/14/2026, 6:38:22 AM

Last updated: 2/21/2026, 12:22:07 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats